1
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

2
Published 2014
Auerbach
Table of Contents: ...<P>Survey of Secure Computing; <EM>Kuruvilla Mathew and Biju Issac<BR></EM>Feature Selection...