Search alternatives:
securite » securities, secure

1
by Thermos, Peter
Published 2007
Addison-Wesley
Table of Contents: ... mechanisms -- Ch. 7. Key management mechanisms -- Ch. 8. VoIP and network security controls -- Ch. 9. A...

2
by Porter, Thomas
Published 2007
Syngress
Table of Contents: ...Introduction to VoIP Security -- The hardware infrastructure -- Architectures -- Support Protocols...

3
by Zdziarski, Jonathan A.
Published 2008
O'Reilly Media
Subjects: ...Mobile computing / Security measures...

4
by Penttinen, Jyrki T. J.
Published 2019
John Wiley & Sons, Inc.
Table of Contents: ... Machine Learning and Artificial Intelligence; References; 8 Security; 8.1 Overview; 8.2 5G Security...

5
by Kruegle, Herman
Published 2011
Elsevier Science
Table of Contents: ...2.6.2.1 Analog2.6.2.2 Digital; 2.6.2.3 Internet; 2.6.3 Low-Light-Level Intensified Camera; 2.6.4...

6
Published 2021
CRC Press
Table of Contents: ... -- Mobile forensics tools -- Visual analysis -- Secured storage -- Damaged media -- Summary -- References...