1
by Abdel-Hamid, Ahmed, Andrews, Scott, Arsanjani, Ali
Published 2015
IBM Corporation, International Technical Support Organization
Subjects: ...Mobile computing / Security measures...

2
by Kite, Robert
Published 2010
Peachpit Press
Subjects: ...Macintosh (Computer) / Security measures / blmlsh...

3
by Hoog, Andrew
Published 2011
Syngress
Table of Contents: ...Chapter 1 Android and Mobile Forensics Chapter 2 Android Hardware Platforms Chapter 3 Android...

4
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

5
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

6
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19...

7
by Ruan, Xiaoyu
Published 2014
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... on Today's Foundation -- Isolated Computing Environment -- Security-Hardening Measures -- Basic Utilities...

8
by DeFranco, Joanna F., Maley, Bob
Published 2022
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

9
by Martin, Keith M.
Published 2020
HighBridge Audio
Subjects: ...Internet / Security measures...