1
Published 2014
CRC Press
Table of Contents: ... Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN Security...

2
by Çayirci, E.
Published 2009
Wiley
Table of Contents: ...Security in Wireless Ad Hoc and Sensor Networks; Contents; About the Authors; Preface...

3
by Gregg, Michael
Published 2008
Wiley
Table of Contents: ... -- 7. Understanding Cryptographic Systems -- 8. Defeating Malware -- 9. Securing Wireless Systems -- 10...

4
by Aggarwal, Manuj
Published 2018
Packt Publishing
Table of Contents: ... for failover or load balancer; Port forwarding or Network Address Translation; pfSense features; Prerequisites...

5
by Furnell, Steven
Published 2009
IT Governance Pub.
Subjects: ...COMPUTERS / Networking / Security / bisacsh...

6
by Schroder, Carla
Published 2008
O'Reilly
Table of Contents: ...1. Introduction to Linux Networking -- 2. Building a Linux Gateway on a Single-Board Computer -- 3...

7
by Rosenberg, Jonathan B.
Published 2004
SAMS
Subjects: ...COMPUTERS / Networking / Security / bisacsh...

8
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: .... Security policy...

9
by Boyles, Tim
Published 2010
Wiley Pub.
Table of Contents: ... Security; Chapter 2: Creating the Secure Network; Chapter 3: Securing Administrative Access; Chapter 4...

10
by Collins, Michael
Published 2017
O'Reilly Media
Table of Contents: ... placement in networks -- Sensors in the network domain -- Data in the service domain -- Sensors...

11
by Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents: ...Security of Wireless Systems -- Internet of Things -- Smartcards and Secure Elements -- Wireless...

12
by Shostack, Adam
Published 2014
John Wiley and Sons
Subjects: ...COMPUTERS / Networking / Security / bisacsh...

13
by Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents: ... as a Secure Web Gateway; Network Inspection System; Malware Inspection; HTTPS Inspection; URL Filtering...

14
by Diogenes, Yuri
Published 2010
Microsoft Press
Table of Contents: ...; Configuring SSL Network Tunneling; Customizing Network Connector Settings; Client Experience with Network...

15
by Dubrawsky, Ido
Published 2010
Syngress
Subjects: ...COMPUTERS / Networking / Security / bisacsh...

16
by Mather, Tim
Published 2009
O'Reilly
Table of Contents: ...Introduction -- What is cloud computing? -- Infrastructure security -- Data security and storage...

17 Table of Contents: ... -- XML-RPC, SOAP, and RESTNetwork Monitoring and SecurityNetwork ModelingAuthentication, Authorization...

18
by Huang, Kaizhe, Jumde, Pranjal
Published 2020
Packt Publishing
Subjects: ...Computer networking & communications / bicssc...

19
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...

20
by Mitropoulos, Nick
Published 2019
McGraw-Hill
Table of Contents: ...Chapter 6 Network and Communications Security -- Questions -- Quick Answer Key -- Answers...