-
1
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
Published 2005“…Newnes,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
2
Bulletproof wireless security GSM, UMTS, 802.11 and ad hoc security /
Published 2005“…Newnes,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
3
Secure roaming in 802.11 networks
Published 2007“…Newnes/Elsevier,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
4
Optimizing and testing WLANs proven techniques for maximum performance /
Published 2007“…Elsevier Newnes,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
5
Practical embedded security building secure resource-constrained systems /
Published 2008“…Elsevier/Newnes,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
6
Secure roaming in 802.11 networks
Published 2007“…Newnes/Elsevier,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
7
Optimizing and testing WLANs proven techniques for maximum performance /
Published 2007“…Elsevier Newnes,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
8
Practical embedded security building secure resource-constrained systems /
Published 2008“…Elsevier/Newnes,…”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook