61
by Piens, Tom
Published 2023
Packt Publishing
Subjects: ...Computer networks / Security measures / fast...

62 Table of Contents: ... Security Through Trust in Mobile Ad-Hoc Networks Using Soft Computing Methods -- 4. Prooof of Virture...

63
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19...

64
by Hoffman, Daniel
Published 2008
Wiley Pub.
Table of Contents: .... 5. Understanding the Need for Mobile NAC -- Ch. 6. Understanding Cisco Clean Access -- Ch. 7...

65
by Grobman, Steve, Cerra, Allison
Published 2016
Apress, Distributed by Springer Science+Business Media New York
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

66
by Beaver, Kevin
Published 2010
Wiley Pub.
Table of Contents: ... Security; Chapter 7: Passwords; Part III: Hacking the Network; Chapter 8: Network Infrastructure; Chapter 9...

67
by Dulaney, Emmett A.
Published 2011
Wiley Pub.
Table of Contents: ...; Hardening the Operating System; Application Hardening; Working with Data Repositories; Host Security; Mobile...

68
by Beaver, Kevin
Published 2016
John Wiley & Sons, Inc.
Table of Contents: ... systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing...

69
by Woland, Aaron T., Heary, Jamey
Published 2017
Cisco Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

70
by Chapple, Mike, Seidl, David
Published 2021
Sybex
Table of Contents: ... Security -- Chapter 13. Wireless and Mobile Security -- Chapter 14. Incident Response -- Chapter 15...

71
Published 2011
Chapman and Hall/CRC
Table of Contents: ... Reading and Web Sites Mobile Security, Jan Audestad; The GSM Security; 3G Architecture; Extent...

72
by Kelley, Jay
Published 2009
Wiley Pub.
Table of Contents: ... in Your Network -- Ch. 6. Writing a Corporate Security Policy -- Ch. 7. Herding the Cattle -- Ch. 8...

73
Published 2023
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

74 Table of Contents: ... Discovery Process; 2.12.2 Route Maintenance Process; 2.13 Security Challenges in MANETs...

75
Published 2022
Addison-Wesley Professional
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

76
by Bidgoli, Hossein
Published 2006
John Wiley
Table of Contents: ... Java Applets -- Spyware -- Mobile Code and Security -- Wireless Threats and Attacks -- WEP Security...

77
Published 2014
CRC Press, Taylor & Francis Group
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

78
by Williams, Branden R., Chuvakin, Anton A.
Published 2015
Syngress
Table of Contents: ... computing -- Mobile -- PCI for the small business -- Managing a PCI DSS project to achieve compliance...

79
Published 2023
Pearson
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

80
by Haber, Morey J.
Published 2020
Apress
Table of Contents: ... (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware and Privileges...