21
by Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents: ... Payment and Access Systems -- Wireless Security Platforms and Functionality -- Mobile Subscription...

22
by Schoenfield, Brook S. E.
Published 2015
CRC Press
Table of Contents: ... Architecture; Chapter 8: Business Analytics; Chapter 9: Endpoint Anti-malware; Chapter 10: Mobile Security...

23
by Rhodes-Ousley, Mark
Published 2013
McGraw Hill Education
Table of Contents: ... -- Create a Computer Security Defense Plan -- Summary -- References -- Chapter 5: Security Policies...

24
by Joshi, James B. D.
Published 2008
Morgan Kaufmann/Elsevier
Table of Contents: ...; Chapter 7 Security in Wireless Systems; Chapter 8 Mobile Security and Privacy; Chapter 9 Optical Network...

25
by Hoog, Andrew
Published 2011
Syngress
Table of Contents: ...Chapter 1 Android and Mobile Forensics Chapter 2 Android Hardware Platforms Chapter 3 Android...

26
by Doherty, Jim
Published 2006
Cisco Press
Table of Contents: ...Tip 1, use firewalls -- Tip 2, secure your wireless network -- Tip 3, use antivirus protection...

27
by Garbis, Jason, Chapman, Jerry W.
Published 2021
Apress
Table of Contents: ... -- Next-Generation Firewalls -- Security Information and Event Management -- Web Server and Web...

28
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

29
by Malik, Saadat
Published 2003
Cisco
Table of Contents: ...Part I. Introduction to network security -- An introduction to network security -- Part II...

30
by Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents: ..., and Visual Basic -- Mobile code II: Java, JavaScript, Flash, and Shockwave -- pt. III. Web server security...

31
by Cross, Michael
Published 2007
Syngress Pub.
Table of Contents: ...; Chapter 3: Understanding the Risk Associated with Mobile Code; Chapter 4: Vulnerable CGI Scripts; Chapter...

32
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

33
by Messier, Ric
Published 2017
Wiley
Table of Contents: ...; PacketTotal; Wireshark; Security Information and Event Management; Summary; Chapter 11: Network Scanning; Port...

34
by Groom, Frank M., Groom, Kevin M., Jones, Stephan
Published 2017
CRC Press
Table of Contents: ... and defensive mechanisms -- Denial-of-service attacks -- Mobile platform security -- Cellular access security...

35
by Conti, Greg
Published 2009
Addison-Wesley
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

36
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ... of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks...

37
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

38
by Carroll, Brandon
Published 2004
Cisco Press
Subjects: ...Computer networks / Security measures / Examinations / fast...

39
by Hurley, Chris
Published 2006
Syngress
Table of Contents: ...Introduction to wireless : from past to present -- Wireless security -- Dangers of wireless devices...

40
Published 2014
CRC Press
Table of Contents: ... Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN Security...