1
Published 2014
Auerbach
Table of Contents: ...Ghaznavi-Ghoushchi<BR></EM>A Case Study on Security Issues in LT E Backhaul and Core Networks; <EM...

2
by Krausz, Michael
Published 2013
IT Governance Pub.
Table of Contents: ...Introduction -- The Daily Breach -- Information Security and Business Risk -- Cost Factors of a...

3
by Dunham, Ken
Published 2009
Syngress Pub.
Subjects: ...Mobile computing / Security measures...

4
by Street, Jayson E.
Published 2010
Syngress/Elsevier
Table of Contents: ...N; CHAPTER E1GHT; CHAPTER N1N3; CHAPTER T3N; 3P1L0GU3; PART 2: SECURITY THREATS ARE REAL (STAR) 2.0...

5
by Gray, Joe
Published 2022
No Starch Press
Subjects: ...Penetration testing (Computer security) / fast...

6
by Davidoff, Sherri
Published 2012
Prentice Hall
..."This is a must-have work for anybody in information security, digital forensics, or involved...

7
by Tan, Joseph K. H.
Published 2005
Jossey-Bass
Table of Contents: ... Sheps, Joseph Tan -- E-security : frameworks for privacy and security in e-health data integration...

8
by Grossetete, Patrick
Published 2008
Cisco Press
... Security Telecommunications Advisory Committee Next Generation Network Task Force. Understand how efficient...

9
by Strauss, Dirk
Published 2017
Packt Publishing
... the Rx library using Reactive extensions Exploring .Net Core 1.1 and ASP.NET MVC Securing your...

10
by Kuhl, Joan Snyder
Published 2019
Berrett-Koehler Publishers
... for women seeking to build the confidence and conviction to secure the seat at the table they've earned...