Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: Mobile Computing / Security Measures
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"004 - Data processing & computer science"
Showing
41
-
60
of
245
Search:
'Mobile Computing / Security Measures'
,
query time: 1.40s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
41
Networking and
Mobile
Computing
: 3rd International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
... 20:
Security
III -- Session 21: TCP/IP and
Measurement
-- Session 22: Algorithms III -- Session 23...
”
Read Now
42
Practical Industrial Internet of Things
security
: a practitioner's guide to securing connected industries
by
Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents:
“
...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT
security
...
”
Call Number:
TK5105.8857
Read Now
43
Passive and Active
Measurement
: 15th International Conference, PAM 2014, Los Angeles, CA, USA, March 10-11, 2014, Proceedings
Published 2014
Springer International Publishing
Table of Contents:
“
... of
Mobile
Client Traffic -- An End-to-End
Measurement
Study of Modern Cellular Data Networks -- A Second...
”
Read Now
44
E-Business and Telecommunications : 19th International Conference, ICSBT 2022, Lisbon, Portugal, July 14–16, 2022, and 19th International Conference, SECRYPT 2022, Lisbon, Portugal...
Published 2023
Springer Nature Switzerland
Table of Contents:
“
...SPOT+:
Secure
and Privacy-Preserving Proximity-Tracing Protocol with Efficient Verification over...
”
Read Now
45
Attacks and Defenses for the Internet-of-Things : 5th International Workshop, ADIoT 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers
Published 2022
Springer Nature Switzerland
Table of Contents:
“
... Adder Using Neuroevolution -- Explainable AI and Deep Autoencoders Based
Security
Framework for IoT...
”
Read Now
46
E-Business and Telecommunications : 17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8–10, 2020, Revised Selected Papers
Published 2021
Springer International Publishing
Table of Contents:
“
... --
Security
and Complexity of a New Variant of the McEliece Cryptosystem using Non-linear Convolutional Codes...
”
Read Now
47
E-Business and Telecommunications : 18th International Conference, ICETE 2021, Virtual Event, July 6–9, 2021, Revised Selected Papers
Published 2023
Springer Nature Switzerland
Table of Contents:
“
..., Prediction, and Recommendation using Process Mining Techniques --
Security
and Cryptography -- A...
”
Read Now
48
Passive and Active
Measurement
: 14th International Conference, PAM 2013, Hong Kong, China, March 18-19, 2013, Proceedings
Published 2013
Springer Berlin Heidelberg
Table of Contents:
“
...
Measurement
Design, Experience and Analysis -- Internet Wireless and
Mobility
-- Performance...
”
Read Now
49
SECURITY
IN IOT : the changing perspective
by
CHAKI, RITUPARNA. ROY, DEBDUTTA BARMAN.
Published 2021
CRC PRESS
Subjects:
“
...Internet of things /
Security
measures
...
”
Call Number:
TK5105.8857
Read Now
50
Privacy and
security
challenges in cloud
computing
: a holistic approach
Published 2022
CRC Press
Table of Contents:
“
...1.
Security
enhanced cloud for Serverless
Computing
and its applications -- 2. Revealing the Web...
”
Call Number:
QA76.585
Read Now
51
Passive and Active
Measurement
: 16th International Conference, PAM 2015, New York, NY, USA, March 19-20, 2015, Proceedings
Published 2015
Springer International Publishing
Table of Contents:
“
... DNS Amplification Attacks and Effective Mitigation --
Measuring
BGP Route Origin Registration...
”
Read Now
52
Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats
by
Kotipalli, Srinivasa Rao
,
Imran, Mohammed A.
Published 2016
Packt Publishing
Table of Contents:
“
... -- Threats at the client side -- Threats at the backend -- Guidelines for testing and
securing
mobile
apps...
”
Call Number:
QA76.774.A53
Read Now
53
IOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
by
Tiepolo, Gianluca
Published 2022
Packt Publishing
Subjects:
“
...
Mobile
computing
/
Security
measures
...
”
Call Number:
QA76.774.I67
Read Now
54
iOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting, and reporting sensitive evidence
by
Tiepolo, Gianluca
Published 2022
Packt Publishing, Limited
Subjects:
“
...
Mobile
computing
/
Security
measures
...
”
Call Number:
QA76.774.I67
Read Now
55
Junos
Security
by
Cameron, Rob
Published 2010
O'Reilly Media, Inc.
Table of Contents:
“
...;
Mobile
Carriers; Cloud Networks; The Junos Enterprise Services Reference Network; SRX Series Product...
”
Call Number:
TK5105.543
Read Now
56
Passive and Active
Measurement
: 17th International Conference, PAM 2016, Heraklion, Greece, March 31 - April 1, 2016. Proceedings
Published 2016
Springer International Publishing
Table of Contents:
“
... -- Crowdsourcing
Measurements
of
Mobile
Network Performance and
Mobility
during a Large Scale Event -- A Study...
”
Read Now
57
Mobile
sensors and context-aware
computing
by
Gajjar, Manish J.
Published 2017
Morgan Kaufmann is an imprint of Elsevier
Table of Contents:
“
... Faced by
Mobile
Computing
Systems; Resource Poor; Less
Secured
/Reliable; Intermittent Connectivity...
”
Call Number:
TK7872.D48
Read Now
58
E-Business and Telecommunications : 14th International Joint Conference, ICETE 2017, Madrid, Spain, July 24-26, 2017, Revised Selected Paper
Published 2019
Springer International Publishing
Table of Contents:
“
... to
Securing
P2PSIP in MANETs -- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand...
”
Read Now
59
Passive and Active
Measurement
: 21st International Conference, PAM 2020, Eugene, Oregon, USA, March 30–31, 2020, Proceedings
Published 2020
Springer International Publishing
Table of Contents:
“
...Active
Measurement
-- Discovering the IPv6 Network Periphery -- Improving Coverage of Internet...
”
Read Now
60
Computer
Network
Security
...
Published 2005
Springer Berlin Heidelberg
Table of Contents:
“
... Vulnerabilities and
Measuring
Security
Level at Design and Exploitation Stages of
Computer
Network LifeCycle -- A...
”
1
2
3
4
5
6
7
8
9
10
11
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 004 - Data processing & computer science
Year of Publication
From:
To:
Classification
004 - Data processing & computer science
005 - Computer programming, programs & data
18
621 - Applied physics
18
500 - Natural sciences & mathematics
14
331 - Labor economics
13
374 - Adult education
9
more ...
658 - General management
4
330 - Economics
3
338 - Production
3
384 - Communications; telecommunication
3
620 - Engineering & allied operations
2
300 - Social sciences
1
302 - Social interaction
1
364 - Criminology
1
371 - Schools & their activities; special education
1
see all ...
less ...
Language
English
242
German
3
Collection
Springer eBooks 2005-
186
O'Reilly
44
Springer Book Archives -2004
15
Author
Gervasi, Osvaldo
4
Koucheryavy, Yevgeni
4
Murgante, Beniamino
4
Qiu, Meikang
4
Dillon, Tharam
3
Herrero, Pilar
3
more ...
Kurosu, Masaaki
3
Meersman, Robert
3
Meng, Weizhi
3
Meyers, Mike
3
Obaidat, Mohammad S.
3
Rosenzweig, Gary
3
Shi, Yong
3
Slezak, Dominik
3
Sloot, Peter M.A.
3
Stephanidis, Constantine
3
Albada, Geert Dick van
2
Balandin, Sergey
2
Bettany, Andrew
2
Bonaventure, Olivier
2
Carle, Georg
2
Cerra, Allison
2
Chen, Guihai
2
Chong, Ilyoung
2
Diaz-Nafria, Jose Maria
2
Dongarra, Jack
2
Fidopiastis, Cali M.
2
Gaj, Piotr
2
Garau, Chiara
2
Grobman, Steve
2
Guarda, Teresa
2
Gueye, Assane
2
Katsikas, Sokratis K.
2
Kwiecien, Andrzej
2
Moallem, Abbas
2
Moltchanov, Dmitri
2
Nah, Fiona
2
Ndiaye, Ababacar
2
Pardede, Eric
2
Portela, Filipe
2
Rocha, Ana Maria A. C.
2
Samarati, Pierangela
2
Schmorrow, Dylan D.
2
Shen, Xuemin (Sherman)
2
Siau, Keng
2
Simplot-Ryl, David
2
Skianis, Charalabos
2
Stera, Piotr
2
Taniar, David
2
Tari, Zahir
2
Tiepolo, Gianluca
2
Unger, Herwig
2
Wang, Wei
2
Warren, Andrew
2
Wijnhoven, Fons
2
Yang, Laurence Tianruo
2
Aagesen, Finn Arve
1
Abdelzaher, Tarek
1
Abdullah, Nibras
1
Abraham, Ajith
1
Abramson, David
1
Acquisti, Alessandro
1
Agha, K. Al
1
Akanbi, Oluwatobi Ayodeji
1
Akar, Nail
1
Akyildiz, Ian F.
1
Al Agha, Khaldoun
1
Alagar, Vangalur
1
Almeroth, Kevin
1
Alvarez Sanchez, Jose-Ramon
1
Amiri, Iraj Sadegh
1
Anbar, Mohammed
1
Andrade, Roberto O.
1
Andrews, Scott
1
Aniss, Hasnaâ
1
Antona, Margherita
1
Ardagna, Claudio Agostino
1
Aroyo, Lora
1
Aspnes, James
1
Athanasopoulos, Elias
1
Avgerou, Chrisanthi
1
Avritzer, Alberto
1
Aykin, Nuray
1
Ballmann, Bastian
1
Bao, Wei
1
Barcellos, Marinho
1
Barken, Lee
1
Barlet-Ros, Pere
1
Barthès, Jean-Paul A.
1
Bartolini, Novella
1
Bassioni, Ghada
1
Bauknecht, Kurt
1
Bauschert, Thomas
1
Ben-Othman, Jalel
1
Bera, Rabindranath
1
Bermel, Eric
1
Bertels, Koen
1
Bestavros, Azer
1
Bhatt, Chintan M.
1
Bhattacharjee, Sravani
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=3&filter%5B%5D=dewey-ones%3A%22004+-+Data+processing+%26+computer+science%22&lookfor=Mobile+Computing+%2F+Security+Measures&type=AllFields
Send by Email
×
Loading...