1
Published 2011
British Informatics Society
Table of Contents: ... are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot...

2
by Klett, Gerhard, Kersten, Heinrich
Published 2015
mitp
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

3
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

4
by Gajjar, Manish J.
Published 2017
Morgan Kaufmann is an imprint of Elsevier
Table of Contents: ... Faced by Mobile Computing Systems; Resource Poor; Less Secured/Reliable; Intermittent Connectivity...

5
by Grobman, Steve, Cerra, Allison
Published 2016
Apress, Distributed by Springer Science+Business Media New York
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

6 Table of Contents: ... Discovery Process; 2.12.2 Route Maintenance Process; 2.13 Security Challenges in MANETs...

7
by Gupta, Aditya
Published 2019
Apress
Table of Contents: ... -- Chapter 8: Exploiting Mobile, Web and Network for IoT -- Chapter 9: Software Defined Radio -- Chapter 10...

8
by Flickenger, Rob
Published 2003
O'Reilly
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

9
by Nickel, Jochen
Published 2019
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

10
by Barken, Lee
Published 2004
Syngress
Table of Contents: ... of the Wireless World; SoCalFreeNet.org: Building Large Scale Community Wireless Networks; Securing Our Wireless...

11
by Zeng, Kai
Published 2011
Wiley
Table of Contents: ... -- Opportunistic Routing Security -- Opportunistic Broadcasts in Vehicular Networks -- Conclusions and future...

12
by Sosinsky, Barrie A.
Published 2011
Wiley Publishing, Inc.
Table of Contents: ... adoption -- Measuring cloud computing costs -- Avoiding capital expenditures -- Right-sizing -- Computing...

13
by Evelyn, Geoff
Published 2013
Microsoft Press
Table of Contents: ...; Lost IP; Security breaches; Information leaks; Patching of mobile devices...