1
by Kite, Robert
Published 2010
Peachpit Press
Subjects: ...Macintosh (Computer) / Security measures / blmlsh...

2
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ... of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks...

3
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

4
by Haines, Brad
Published 2008
Syngress Pub.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

5
Published 2011
Chapman and Hall/CRC
Table of Contents: ... Reading and Web Sites Mobile Security, Jan Audestad; The GSM Security; 3G Architecture; Extent...

6
by El Khoury, Franjieh
Published 2013
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

7
by DeFranco, Joanna F.
Published 2014
CRC Press
Table of Contents: ...1. Security threats -- 2. Cyber security and digital forensics careers -- 3. Cyber security -- 4...

8
by Nascimento, Adolfo Eloy
Published 2017
Packt Publishing
Subjects: ...Application program interfaces (Computer software) / Security measures...

9
by Rajani, Renu
Published 2017
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

10
by Flickenger, Rob
Published 2003
O'Reilly
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

11
by Zeng, Kai
Published 2011
Wiley
Table of Contents: ... -- Opportunistic Routing Security -- Opportunistic Broadcasts in Vehicular Networks -- Conclusions and future...