1
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...

2
by Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents: ...Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...

3
by Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents: ...Begriffsdefinitionen und KonzepteSecurity Labels; Spezifikation von Zugriffskontrollrichtlinien...

4
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

5
by Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents: ...pt. 1. Living securely in the smart world -- pt. 2. Implementing enterprise mobile security -- pt...

6
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. WLAN -- 3. PDAs -- 4. Mobile phones -- 5. Bluetooth -- 6. Infrared -- 7...

7 Subjects: ...Mobile computing / Security measures...

8
by Bergman, Neil
Published 2013
McGraw-Hill
Table of Contents: ... -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile...

9
by Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents: ... Payment and Access Systems -- Wireless Security Platforms and Functionality -- Mobile Subscription...

10
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

11
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ... of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks...

12
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

13
Published 2014
CRC Press
Table of Contents: ... Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN Security...

14
by Haines, Brad
Published 2008
Syngress Pub.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

15
by Chapple, Mike, Stewart, James Michael, Gibson, Darril
Published 2021
John Wiley and Sons, Inc.
Table of Contents: ... of Security Models 322 -- Trusted Computing Base 323 -- State Machine Model 325 -- Information Flow Model 325...

16
by Linn, Heather, Nutting, Ray
Published 2022
McGraw-Hill Education
Table of Contents: ...-Centric Attacks -- Chapter Review -- Chapter 7 Specialized and Fragile Systems -- Mobile Devices...

17
by Flickenger, Rob
Published 2003
O'Reilly
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

18
by Zeng, Kai
Published 2011
Wiley
Table of Contents: ... -- Opportunistic Routing Security -- Opportunistic Broadcasts in Vehicular Networks -- Conclusions and future...

19
Published 2018
John Wiley & Sons, Inc.
Table of Contents: ... -- 2.4.3 Classification Performance Measures 41 -- 2.5 Experimental Results 44 -- 2.5.1 TSS vs. OFS...