How to cheat at securing a wireless network /
Mobile Security : a Pocket Guide.
Network security evaluation : using the NSA IEM /
Network Security Strategies : Protect Your Network and Enterprise Against Advanced Cybersecurity Attacks and Threats.
Hack the stack : using snort and ethereal to master the 8 layers of an insecure network /
Web application security is a stack : how to CYA (Cover Your Apps) completely /
Advances in cyber security : technology, operations, and experiences /
Information security handbook : develop a threat model and incident response strategy to build a strong information security framework /
Network and system security /
Information security risk management for ISO27001/ISO27002 /
Active Directory administration cookbook : actionable, proven solutions to identity management and authentication on servers and in the cloud /
Google hacking for penetration testers.
Managing Cisco network security /
CyberWar, CyberTerror, CyberCrime.
Hack proofing Sun Solaris 8 /
Firewall design and analysis /
Wireless communications and networking /
Designing and building enterprise DMZs /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Computer network /
Web penetration testing with Kali Linux : build your defense against web attacks with Kali Linus 2.0 /
The resilience of networked infrastructure systems : analysis and measurement /
Network analysis, architecture, and design /
Securing the cloud : cloud computer security techniques and tactics /
Strategy for an Army center for network science, technology, and experimentation /
Transforming combustion research through cyberinfrastructure /
Toward a national research network /
Computer networks and communications /
Theories, Practices and Examples for Community and Social Informatics.
Global trends in computer technology and their impact on export control /
Getting started with Terraform : manage production infrastructure as a code /
Nokia network security : solutions handbook /
PCI compliance : implementing effective PCI data security standards /
Cyber crime, security and digital intelligence /
Who goes there? : authentication through the lens of privacy /
Nessus network auditing /
The RF in RFID : passive UHF RFID in practice /
Designing a wireless network /
Wireless technician's handbook /
Wired and wireless seamless access systems for public infrastructure
Home networking technologies and standards /
Wireless Internet telecommunications /
The future of wireless communications /
The foundations of the digital wireless world : selected works of A J Viterbi /
Recent trends in microstrip antennas for wireless applications /
Radio engineering for wireless communication and sensor applications /
Hack proofing your wireless network /
Developing IoT projects with ESP32 automate your home or business with inexpensive wi-fi devices /
Sōsharu nettowāku jidai no jōhō moraru to sekyuriti /
Virtualizing 5G and beyond-5G mobile networks /
Going mobile : how wireless technology is reshaping our lives /
The wireless spectrum : the politics, practices, and poetics of mobile media /
Mobile and wireless communications networks : the proceedings of the fifth IFIP-TC6 International Conference on Mobile and Wireless Communications Networks, Singapore, 27-29 October 2003 /