Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: Mobile Computing / Security Measures
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"331 - Labor economics"
dewey-ones:"384 - Communications; telecommunication"
Showing
1
-
19
of
19
Search:
'Mobile Computing / Security Measures'
,
query time: 3.48s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Mobile
application
security
by
Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents:
“
...Cover Page --
Mobile
Application
Security
-- Copyright Page -- About the Authors -- Dedication...
”
Call Number:
TK5102.85
Read Now
2
Mobile
Security
: a Pocket Guide
by
Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents:
“
...Chapter 1: getting
mobile
; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...
”
Call Number:
QA76.59
Read Now
3
Netzsicherheit : Grundlagen & Protokolle - Mobile & drahtlose Kommunikation - Schutz von Kommunikationsinfrastrukturen
by
Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents:
“
...Begriffsdefinitionen und Konzepte
Security
Labels; Spezifikation von Zugriffskontrollrichtlinien...
”
Call Number:
QA76.9
Read Now
4
Mobile
malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents:
“
... of
mobile
malware -- Debugging and disassembly of MMC --
Mobile
malware mitigation
measures
...
”
Call Number:
TK5102.85
Read Now
5
Mobile
device
security
for dummies
by
Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents:
“
...pt. 1. Living
securely
in the smart world -- pt. 2. Implementing enterprise
mobile
security
-- pt...
”
Call Number:
TK5102.85
Read Now
6
Wireless
security
by
Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents:
“
...1. Introduction -- 2. WLAN -- 3. PDAs -- 4.
Mobile
phones -- 5. Bluetooth -- 6. Infrared -- 7...
”
Call Number:
TK5103.2
Read Now
7
Intelligent
mobile
malware detection
by
Thomas, Tony
,
John, Teenu S.
,
Surendran, Roopak
,
Alazab, Mamoun
Published 2023
CRC Press
Subjects:
“
...
Mobile
computing
/
Security
measures
...
”
Call Number:
TK5105.59
Read Now
8
Hacking exposed : mobile security secrets & solutions
by
Bergman, Neil
Published 2013
McGraw-Hill
Table of Contents:
“
... --
Mobile
Services and
Mobile
Web --
Mobile
Device Management --
Mobile
Development
Security
--
Mobile
...
”
Call Number:
TK5105.59
Read Now
9
Wireless communications
security
: solutions for the internet of things
by
Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents:
“
... Payment and Access Systems -- Wireless
Security
Platforms and Functionality --
Mobile
Subscription...
”
Call Number:
TK5103.2
Read Now
10
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
by
Bachrach, Daniel G.
,
Rzeszut, Eric J.
Published 2014
Apress
Table of Contents:
“
... to Your Digital Life;
Mobile
Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...
”
Call Number:
QA76.9.A25
Read Now
11
Security
for multihop wireless networks
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents:
“
... of
Security
Attacks in MANETs; Chapter 2:
Security
and Privacy for Routing Protocols in
Mobile
Ad Hoc Networks...
”
Call Number:
TK5103.2
Read Now
12
Securing
the borderless network : security for the web 2.0 world
by
Gillis, Tom
Published 2010
Cisco Press
Table of Contents:
“
...Network
security
: yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...
”
Call Number:
TK5105.88817
Read Now
13
Intrusion detection in wireless ad-hoc networks
Published 2014
CRC Press
Table of Contents:
“
... Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN
Security
...
”
Call Number:
TK5102.85
Read Now
14
Kismet hacking
by
Haines, Brad
Published 2008
Syngress Pub.
Subjects:
“
...
Computer
networks /
Security
measures
/ http://id.loc.gov/authorities/subjects/sh94001277...
”
Call Number:
TK5103.2
Read Now
15
(ISC)2 CISSP certified information systems
security
professional official study guide
by
Chapple, Mike
,
Stewart, James Michael
,
Gibson, Darril
Published 2021
John Wiley and Sons, Inc.
Table of Contents:
“
... of
Security
Models 322 -- Trusted
Computing
Base 323 -- State Machine Model 325 -- Information Flow Model 325...
”
Call Number:
QA76.3
Read Now
16
CompTIA PenTest+ Certification All-In-One Exam Guide, Second Edition (Exam PT0-002)
by
Linn, Heather
,
Nutting, Ray
Published 2022
McGraw-Hill Education
Table of Contents:
“
...-Centric Attacks -- Chapter Review -- Chapter 7 Specialized and Fragile Systems --
Mobile
Devices...
”
Call Number:
QA76.9.A25
Read Now
17
Wireless hacks
by
Flickenger, Rob
Published 2003
O'Reilly
Subjects:
“
...
Computer
networks /
Security
measures
/ http://id.loc.gov/authorities/subjects/sh94001277...
”
Call Number:
TK5103.2
Read Now
18
Multihop wireless networks : opportunistic routing
by
Zeng, Kai
Published 2011
Wiley
Table of Contents:
“
... -- Opportunistic Routing
Security
-- Opportunistic Broadcasts in Vehicular Networks -- Conclusions and future...
”
Call Number:
TK5105.543
Read Now
19
IPTV delivery networks : next generation architectures for live and video-on-demand services
Published 2018
John Wiley & Sons, Inc.
Table of Contents:
“
... -- 2.4.3 Classification Performance
Measures
41 -- 2.5 Experimental Results 44 -- 2.5.1 TSS vs. OFS...
”
Call Number:
TK5105.887
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 331 - Labor economics
Clear Filter
Classification: 384 - Communications; telecommunication
Year of Publication
From:
To:
Classification
331 - Labor economics
384 - Communications; telecommunication
005 - Computer programming, programs & data
15
620 - Engineering & allied operations
5
364 - Criminology
3
500 - Natural sciences & mathematics
3
more ...
004 - Data processing & computer science
2
374 - Adult education
2
621 - Applied physics
2
658 - General management
2
001 - Knowledge
1
006 - Special computer methods
1
302 - Social interaction
1
see all ...
less ...
Language
English
18
German
1
Collection
O'Reilly
19
Author
Abu-Nimeh, Saeed
1
Alazab, Mamoun
1
Azad, Saiful
1
Bachrach, Daniel G.
1
Bauhaus, Mark
1
Bergman, Neil
1
more ...
Campagna, Rich R.
1
Chaki, Nabendu
1
Chaki, Rituparna
1
Chapple, Mike
1
Clark, Chris
1
Dunham, Ken
1
Dwivedi, Himanshu
1
Fati, Suliman Mohamed
1
Flickenger, Rob
1
Furnell, Steven
1
Gibson, Darril
1
Gillis, Tom
1
Haines, Brad
1
Iyer, Sibbu
1
John, Teenu S.
1
Khan, Shafiullah
1
Krishnan, Ashwin
1
Li, Ming
1
Linn, Heather
1
Lloret Mauri, Jaime
1
Lou, Wenjing
1
Nutting, Ray
1
Osterhage, Wolfgang
1
Pathan, Al-Sakib Khan
1
Penttinen, Jyrki T. J.
1
Rouse, Jason
1
Roßberg, Michael
1
Rzeszut, Eric J.
1
Scambray, Joel
1
Schearer, Michael J.
1
Schäfer, Günter
1
Stanfield, Mike
1
Stewart, James Michael
1
Surendran, Roopak
1
Thiel, David V.
1
Thomas, Tony
1
Thornton, Frank
1
Zeng, Kai
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22331+-+Labor+economics%22&filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&lookfor=Mobile+Computing+%2F+Security+Measures&type=AllFields
Send by Email
×
Loading...