Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
2012
Hacking Point of Sale
2014
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
2012
Securing .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server
2012
Bitcoin for Nonmathematicians
2016
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
2012