Items 31 - 45 of 67
1 2 3 4 5
Sort: 

Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Published: 01/31/2007
Pages: 418
Security for Mobile Networks and Platforms
Security for Mobile Networks and Platforms
Published: 07/31/2006
Pages: 332
Understanding Voice over IP Security
Understanding Voice over IP Security
Published: 03/31/2006
Pages: 276
Wireless Communications Security
Wireless Communications Security
By (author): Hideki Imai
Published: 11/30/2005
Pages: 202
Security in Wireless LANs and MANs
Security in Wireless LANs and MANs
Published: 07/31/2005
Pages: 266
User's Guide to Cryptography and Standards
User's Guide to Cryptography and Standards
Published: 10/31/2004
Pages: 402
Outsourcing Information Security
Outsourcing Information Security
By (author): C. Warren Axelrod
Published: 09/30/2004
Pages: 266
Privacy Protection and Computer Forensics, Second Edition
Privacy Protection and Computer Forensics, Second Edition
Published: 09/30/2004
Pages: 364
Bluetooth Security
Bluetooth Security
Published: 05/31/2004
Pages: 222
A Practical Guide to Managing Information Security
A Practical Guide to Managing Information Security
By (author): Steve Purser
Published: 03/31/2004
Pages: 280
Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
By (author): Jose Nazario
Published: 10/31/2003
Pages: 318
Multicast and Group Security
Multicast and Group Security
Published: 05/31/2003
Pages: 334
1 2 3 4 5