Title: Wireless Security and Cryptography: Specifications and Implementations / Edition 1, Author: Nicolas Sklavos
Title: Wireless Networks: Multiuser Detection in Cross-Layer Design / Edition 1, Author: Christina Comaniciu
Title: Wireless Network Security / Edition 1, Author: Yang Xiao
Title: Wireless Crime and Forensic Investigation / Edition 1, Author: Gregory Kipper
Title: Wireless Communications Security: Solutions for the Internet of Things / Edition 1, Author: Jyrki T. J. Penttinen
Title: Wireless Communications Security / Edition 1, Author: Hideki Imai
Title: WiMAX Security and Quality of Service: An End-to-End Perspective / Edition 1, Author: Seok-Yee Tang
Title: Web Services Security Development and Architecture: Theoretical and Practical Issues, Author: Carlos A. Gutiérrez
Title: Understanding Intrusion Detection through Visualization / Edition 1, Author: Stefan Axelsson
Title: Understanding Cybersecurity: Emerging Governance and Strategy, Author: Gary Schaub
Title: Understanding Cybersecurity Technologies: A Guide to Selecting the Right Cybersecurity Tools, Author: Abbas Moallem
Title: Trusted Recovery and Defensive Information Warfare, Author: Peng Liu
Title: Trusted Platform Modules: Why, when and how to use them, Author: Ariel Segall
Title: Trusted Computing, Author: Chris Mitchell
Title: Trust And Security In Collaborative Computing, Author: Xukai Zou
Title: Transparent User Authentication: Biometrics, RFID and Behavioural Profiling, Author: Nathan Clarke
Title: The Wiley Handbook of Psychology, Technology, and Society / Edition 1, Author: Larry D. Rosen
Title: The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer, Author: Perry Carpenter
Title: The Secret to Cybersecurity: A Simple Plan to Protect Your Family and Business from Cybercrime, Author: Scott Augenbaum
Title: The Russian Secret Police: Muscovite, Imperial Russian and Soviet Political Security Operations 1565-1970, Author: Ronald Hingley

Pagination Links