41
by Behtash, Behzad
Published 2004
Cisco Press
... at the network perimeter to protect against intrusion-is an essential building block to even the most basic...

42
by Flickenger, Rob
Published 2003
O'Reilly
...; and understand the security issues of wireless networking, and protect...

43
by Doherty, Jim
Published 2005
Cisco
... and protect yourself from hackers and viruses Go wireless to put your computers where you want them-not just...

44
by Sabih, Zaid
Published 2018
Packt Publishing
.... Finally, at the end of the course, you will learn how to protect yourself and your systems from...

45
by Sauter, Martin
Published 2014
John Wiley & Sons Inc.
... of a Smart Phone, Fast Dormancy, IMS and High-Speed Downlink Packet Access, and Wi-Fi-Protected Setup...

46
by White, Bill
Published 2020
IBM Redbooks
... integration services Securing and protecting data with encryption everywhere Providing resilience with key...

47
by Gillis, Tom
Published 2010
Cisco Press
... sizes: information and techniques for protecting collaborative systems without compromising...

48
by Sayed, Sohail
Published 2012
Sams
... Central Administration Protect applications with claims-based authorization and other security features...

49
by Hoda, Mynul
Published 2005
Cisco Press

50
by Allen, Julia H.
Published 2008
Addison-Wesley

51
by Hay, Andrew
Published 2009
Syngress Pub.