1
Published 2011
British Informatics Society
Table of Contents: ... are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot...

2
by Kite, Robert
Published 2010
Peachpit Press
Subjects: ...Macintosh (Computer) / Security measures / blmlsh...

3
by Hoog, Andrew
Published 2011
Syngress
Table of Contents: ...Chapter 1 Android and Mobile Forensics Chapter 2 Android Hardware Platforms Chapter 3 Android...

4
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

5
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

6
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

7
by Gajjar, Manish J.
Published 2017
Morgan Kaufmann is an imprint of Elsevier
Table of Contents: ... Faced by Mobile Computing Systems; Resource Poor; Less Secured/Reliable; Intermittent Connectivity...

8
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19...

9 Table of Contents: ... Discovery Process; 2.12.2 Route Maintenance Process; 2.13 Security Challenges in MANETs...

10
by DeFranco, Joanna F., Maley, Bob
Published 2022
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

11
by Sheward, Mike
Published 2018
BCS Learning & Development
Table of Contents: ...; CAPTURING; ANALYSIS; SUMMARY; 13 CLOUD FORENSICS; CLOUD COMPUTING TERMINOLOGY; ACQUISITION IN THE CLOUD...

12
by Flickenger, Rob
Published 2003
O'Reilly
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

13
by Nickel, Jochen
Published 2019
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...