1
by Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents: ...Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...

2
Published 2019
Springer International Publishing
Table of Contents: ... Notifications for Fun and Profit -- The Current State of the Holistic Privacy and Security Modelling Approach...

3
Published 2022
Springer International Publishing
Table of Contents: ... Attacks -- Secure Ownership Transfer for Resource Constrained IoT Infrastructures -- Untangling the XRP...

4
Published 2023
Springer Nature Switzerland
Table of Contents: ...ICScope: Detecting and Measuring Vulnerable ICS Devices Exposed on the Internet -- Zero Update...

5
Published 2020
Springer International Publishing
Table of Contents: ... security behaviour: Development of a measurement instrument based on the self-determination theory...

6
Published 2019
Springer Nature Singapore
Table of Contents: ... Comprehension -- A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing -- Exploit in smart...

7
Published 2022
Springer International Publishing
Subjects: ...Computer networks / Security measures...

8
Published 2022
Springer Nature Switzerland
Table of Contents: ... Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based Security Framework for IoT...