1
by Lim, Ian, Coolidge, E. Coleen, Hourani, Paul
Published 2013
CRC Press/Taylor & Francis
Subjects: ...Mobile computing / Security measures...

2
Published 2017
Syngress
Table of Contents: ...1. Mobile security and privacy / M.H. Au, K.-K.R. Choo -- 2. Mobile security : a practitioner...

3
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...

4
by Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents: ...Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...

5
by Gonzalez, Deborah
Published 2015
Elsevier, Butterworth-Heinemann
Subjects: ...Computer networks / Security measures...

6
by Nakhjiri, Madjid
Published 2005
John Wiley & Sons
Table of Contents: ... -- Internet security and key exchange basics -- Introduction on Internet mobility protocols -- Remote access...

7
by Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents: ...Begriffsdefinitionen und KonzepteSecurity Labels; Spezifikation von Zugriffskontrollrichtlinien...

8
Published 2021
Springer International Publishing
Table of Contents: ... Multicasting in Mobile Edge Computing” -- 11. “Blockchain-based Security Servicesfor Fog Computing”. Part V...

9
Published 2021
Springer International Publishing
Subjects: ...Computer networks / Security measures...

10
by Wu, Chuan-Kun
Published 2021
Springer Nature Singapore
Table of Contents: ... comprehensive set of security measures for IoT....

11
by Gonzalez, Deborah
Published 2015
Butterworth-Heinemann
Table of Contents: ... INSTITUTIONS; HIGHER EDUCATION (FERPA); PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE; OTHER FEDERAL...

12
by Dubey, Abhishek
Published 2013
CRC Press
Table of Contents: ...Introduction -- Android architecture -- Android application architecture -- Android (in)security...

13
Published 2023
Springer Nature Switzerland
Table of Contents: ...Attacks and Malware -- Blockchain -- Cryptography and Privacy -- Machine Learning -- Security...

14
Published 2019
Springer Nature Singapore
Subjects: ...Computer networks / Security measures...

15
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

16
Published 2020
Springer Nature Singapore
Table of Contents: ... and Detection with Deep Sequence Modeling -- Secure Authentication Using One Time Contextual QR Code -- A...

17
Published 2022
Springer Nature Switzerland
Table of Contents: ... -- IoTEnsemble: Detection of Botnet Attacks on Internet of Things -- IoTPrivComp: A Measurement Study of Privacy...

18
Published 2021
Springer Nature Singapore
Table of Contents: ... Database Systems -- Evading Static and Dynamic Android Malware Detection Mechanisms -- Multilevel Secure...

19
by Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents: ...pt. 1. Living securely in the smart world -- pt. 2. Implementing enterprise mobile security -- pt...

20
by Karbab, ElMouatez Billah, Debbabi, Mourad, Derhab, Abdelouahid, Mouheb, Djedjiga
Published 2021
Springer International Publishing
Subjects: ...Computer networks / Security measures...