Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: Mobile Computing / Security Measures
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"004 - Data processing & computer science"
dewey-ones:"500 - Natural sciences & mathematics"
Showing
1
-
14
of
14
Search:
'Mobile Computing / Security Measures'
,
query time: 0.39s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Mobile
computing
: securing your workforce
Published 2011
British Informatics Society
Table of Contents:
“
... are personally liable; taking
security
measures
; are business people breaking the law; 8 stopping the
mobile
bot...
”
Call Number:
QA76.59 .M458 2011
Read Now
2
IOS application
security
: the definitive guide for hackers and developers
by
Thiel, David
Published 2016
No Starch Press
Table of Contents:
“
... This Book Is Structured ; Conventions This Book Follows ; A Note on Swift ;
Mobile
Security
Promises...
”
Call Number:
QA76.9.A25
Read Now
3
Practical
mobile
forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, and Windows Phone platforms
by
Mahalik, Heather
,
Bommisetty, Satish
,
Tamma, Rohit
Published 2016
Packt Publishing
Subjects:
“
...
Mobile
computing
/
Security
measures
...
”
Call Number:
QA76.59
Read Now
4
Practical Industrial Internet of Things
security
: a practitioner's guide to securing connected industries
by
Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents:
“
...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT
security
...
”
Call Number:
TK5105.8857
Read Now
5
Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats
by
Kotipalli, Srinivasa Rao
,
Imran, Mohammed A.
Published 2016
Packt Publishing
Table of Contents:
“
... -- Threats at the client side -- Threats at the backend -- Guidelines for testing and
securing
mobile
apps...
”
Call Number:
QA76.774.A53
Read Now
6
IOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
by
Tiepolo, Gianluca
Published 2022
Packt Publishing
Subjects:
“
...
Mobile
computing
/
Security
measures
...
”
Call Number:
QA76.774.I67
Read Now
7
iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
by
Tiepolo, Gianluca
Published 2022
Packt Publishing, Limited
Subjects:
“
...
Mobile
computing
/
Security
measures
...
”
Call Number:
QA76.774.I67
Read Now
8
Mobile
sensors and context-aware
computing
by
Gajjar, Manish J.
Published 2017
Morgan Kaufmann is an imprint of Elsevier
Table of Contents:
“
... Faced by
Mobile
Computing
Systems; Resource Poor; Less
Secured
/Reliable; Intermittent Connectivity...
”
Call Number:
TK7872.D48
Read Now
9
CSA guide to cloud
computing
: implementing cloud privacy and security
by
Samani, Raj
,
Honan, Brian
,
Reavis, Jim
Published 2015
Syngress
Table of Contents:
“
... CLOUD THREATS; END NOTES; Chapter 4 --
Secure
Cloud for
Mobile
Computing
;
MOBILE
TOP THREATS: EVIL 8.0...
”
Call Number:
QA76.585
Read Now
10
A study of black hole attack solutions : on AODV routing protocol in MANET
by
Fazeldehkordi, Elahe
,
Amiri, Iraj Sadegh
,
Akanbi, Oluwatobi Ayodeji
Published 2016
Elsevier
Table of Contents:
“
... Discovery Process; 2.12.2 Route Maintenance Process; 2.13
Security
Challenges in MANETs...
”
Call Number:
TK5105.59
Read Now
11
Wireless hacks
by
Flickenger, Rob
Published 2003
O'Reilly
Subjects:
“
...
Computer
networks /
Security
measures
/ http://id.loc.gov/authorities/subjects/sh94001277...
”
Call Number:
TK5103.2
Read Now
12
Mastering identity and access management with Microsoft Azure : empower users by managing and protecting identities and data
by
Nickel, Jochen
Published 2019
Packt Publishing
Subjects:
“
...
Computer
networks /
Security
measures
/ http://id.loc.gov/authorities/subjects/sh94001277...
”
Call Number:
QA76.76.A65
Read Now
13
Computer
, intelligent
computing
and education technology
by
Liu, Hsiang-Chuan
Published 2014
CRC Press, Taylor and Francis
Table of Contents:
“
... and the
mobile
phone addiction: Mediating effects of social support; Study on training approach for microsystem...
”
Call Number:
QA75.5
Read Now
14
Managing the web of things : linking the real world to the web
by
Sheng, Quan Z.
Published 2017
Morgan Kaufmann
Table of Contents:
“
... and evaluation of Web of Things systems -- Efficient and
secure
pull requests for emergency cases using a
mobile
...
”
Call Number:
TK5105.8857
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 004 - Data processing & computer science
Clear Filter
Classification: 500 - Natural sciences & mathematics
Year of Publication
From:
To:
Classification
004 - Data processing & computer science
500 - Natural sciences & mathematics
331 - Labor economics
6
330 - Economics
1
338 - Production
1
371 - Schools & their activities; special education
1
more ...
384 - Communications; telecommunication
1
620 - Engineering & allied operations
1
658 - General management
1
see all ...
less ...
Language
English
14
Collection
O'Reilly
14
Author
Tiepolo, Gianluca
2
Akanbi, Oluwatobi Ayodeji
1
Amiri, Iraj Sadegh
1
Bhattacharjee, Sravani
1
Bommisetty, Satish
1
CSA (Organization)
1
more ...
Fazeldehkordi, Elahe
1
Flickenger, Rob
1
Gajjar, Manish J.
1
Honan, Brian
1
IT, BCS The Chartered Institute for
1
Imran, Mohammed A.
1
Jirasek, Vladimir
1
Kotipalli, Srinivasa Rao
1
Liu, Hsiang-Chuan
1
Mahalik, Heather
1
Neely, Matthew
1
Nickel, Jochen
1
Reavis, Jim
1
Samani, Raj
1
Sheng, Quan Z.
1
Sung, Wen-Pei
1
Tamma, Rohit
1
Thiel, David
1
Yao, Wenli
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22004+-+Data+processing+%26+computer+science%22&filter%5B%5D=dewey-ones%3A%22500+-+Natural+sciences+%26+mathematics%22&lookfor=Mobile+Computing+%2F+Security+Measures&type=AllFields
Send by Email
×
Loading...