1
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

2
Published 2014
Auerbach
Table of Contents: ...<P>Survey of Secure Computing; <EM>Kuruvilla Mathew and Biju Issac<BR></EM>Feature Selection...

3
by Deckler, Greg, Powell, Brett
Published 2022
Packt Publishing Ltd.
Table of Contents: ... and Transforming Data with M Designing Import, DirectQuery, and Composite Data Models Developing DAX Measures...

4
by Murray, Daniel G.
Published 2013
J. Wiley & Sons
Table of Contents: ... Consumption -- Security Considerations for Mobile Consumption -- Typical Mobile Usage Patterns -- Using...

5
Published 2009
Physica
Table of Contents: ...Der Erfolg interdisziplinärer Gründungslehre am Beispiel der FH Bonn-Rhein-Sieg -- Mobile Business...