4G: Deployment Strategies and Operational Implications
Trichy Venkataraman Krishnamurthy & Rajaneesh Shetty
C Programming: A Modern Approach
Kim N. King
En una silla de ruedas
Carmen Lyra
CEH Certified Ethical Hacker Study Guide
Kimberly Graves
The Architecture of Privacy: On Engineering Technologies That ...
Courtney Bowman & Ari Gesher & John K Grant & Daniel Slate & Elissa Lerner
Android Security Internals: An In-Depth Guide to Android's Security ...
Nikolay Elenkov
Vmware Vcloud Security
Prasenjit Sarkar
Cryptography and Network Security: Principles and Practice (4th ...
William Stallings
Corporate Computer Security
Randy J Boyle & Raymond R. Panko
Advanced Penetration Testing for Highly-Secured Environments
Lee Allen
Network Security Essentials: Applications and Standards
Apache Security
Ivan Ristic