Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: Mobile Computing / Security Measures
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"331 - Labor economics"
Showing
21
-
40
of
125
Search:
'Mobile Computing / Security Measures'
,
query time: 0.61s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
21
Wireless communications
security
: solutions for the internet of things
by
Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents:
“
... Payment and Access Systems -- Wireless
Security
Platforms and Functionality --
Mobile
Subscription...
”
Call Number:
TK5103.2
Read Now
22
Securing
systems : applied security architecture and threat models
by
Schoenfield, Brook S. E.
Published 2015
CRC Press
Table of Contents:
“
... Architecture; Chapter 8: Business Analytics; Chapter 9: Endpoint Anti-malware; Chapter 10:
Mobile
Security
...
”
Call Number:
TK5105.59
Read Now
23
Information
security
: the complete reference
by
Rhodes-Ousley, Mark
Published 2013
McGraw Hill Education
Table of Contents:
“
... -- Create a
Computer
Security
Defense Plan -- Summary -- References -- Chapter 5:
Security
Policies...
”
Call Number:
TK5105.59
Read Now
24
Network
security
: know it all
by
Joshi, James B. D.
Published 2008
Morgan Kaufmann/Elsevier
Table of Contents:
“
...; Chapter 7
Security
in Wireless Systems; Chapter 8
Mobile
Security
and Privacy; Chapter 9 Optical Network...
”
Call Number:
TK5105.59
Read Now
25
Android forensics : investigation, analysis, and mobile security for Google Android
by
Hoog, Andrew
Published 2011
Syngress
Table of Contents:
“
...Chapter 1 Android and
Mobile
Forensics Chapter 2 Android Hardware Platforms Chapter 3 Android...
”
Call Number:
TK5105.885.G66
Read Now
26
Home network
security
simplified
by
Doherty, Jim
Published 2006
Cisco Press
Table of Contents:
“
...Tip 1, use firewalls -- Tip 2,
secure
your wireless network -- Tip 3, use antivirus protection...
”
Call Number:
TK5105.75
Read Now
27
Zero Trust
security
: an enterprise guide
by
Garbis, Jason
,
Chapman, Jerry W.
Published 2021
Apress
Table of Contents:
“
... -- Next-Generation Firewalls --
Security
Information and Event Management -- Web Server and Web...
”
Call Number:
TK5105.59
Read Now
28
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
by
Bachrach, Daniel G.
,
Rzeszut, Eric J.
Published 2014
Apress
Table of Contents:
“
... to Your Digital Life;
Mobile
Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...
”
Call Number:
QA76.9.A25
Read Now
29
Network
security
principles and practices
by
Malik, Saadat
Published 2003
Cisco
Table of Contents:
“
...Part I. Introduction to network
security
-- An introduction to network
security
-- Part II...
”
Call Number:
TK5105.59
Read Now
30
Web
security
, privacy and commerce
by
Garfinkel, Simson
Published 2002
O'Reilly
Table of Contents:
“
..., and Visual Basic --
Mobile
code II: Java, JavaScript, Flash, and Shockwave -- pt. III. Web server
security
...
”
Call Number:
TK5105.59
Read Now
31
Developer's guide to web application
security
by
Cross, Michael
Published 2007
Syngress Pub.
Table of Contents:
“
...; Chapter 3: Understanding the Risk Associated with
Mobile
Code; Chapter 4: Vulnerable CGI Scripts; Chapter...
”
Call Number:
TK5105.59
Read Now
32
Practical Industrial Internet of Things
security
: a practitioner's guide to securing connected industries
by
Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents:
“
...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT
security
...
”
Call Number:
TK5105.8857
Read Now
33
Network forensics
by
Messier, Ric
Published 2017
Wiley
Table of Contents:
“
...; PacketTotal; Wireshark;
Security
Information and Event Management; Summary; Chapter 11: Network Scanning; Port...
”
Call Number:
TK5105.59
Read Now
34
Network and data
security
for non-engineers
by
Groom, Frank M.
,
Groom, Kevin M.
,
Jones, Stephan
Published 2017
CRC Press
Table of Contents:
“
... and defensive mechanisms -- Denial-of-service attacks --
Mobile
platform
security
-- Cellular access
security
...
”
Call Number:
TK5105.59
Read Now
35
Googling
security
: how much does Google know about you?
by
Conti, Greg
Published 2009
Addison-Wesley
Subjects:
“
...
Computer
networks /
Security
measures
/ http://id.loc.gov/authorities/subjects/sh94001277...
”
Call Number:
QA76.9.A25
Read Now
36
Security
for multihop wireless networks
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents:
“
... of
Security
Attacks in MANETs; Chapter 2:
Security
and Privacy for Routing Protocols in
Mobile
Ad Hoc Networks...
”
Call Number:
TK5103.2
Read Now
37
Securing
the borderless network : security for the web 2.0 world
by
Gillis, Tom
Published 2010
Cisco Press
Table of Contents:
“
...Network
security
: yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...
”
Call Number:
TK5105.88817
Read Now
38
Cisco access control
security
: AAA administrative services
by
Carroll, Brandon
Published 2004
Cisco Press
Subjects:
“
...
Computer
networks /
Security
measures
/ Examinations / fast...
”
Call Number:
QA76.3
Read Now
39
How to cheat at
securing
a wireless network
by
Hurley, Chris
Published 2006
Syngress
Table of Contents:
“
...Introduction to wireless : from past to present -- Wireless
security
-- Dangers of wireless devices...
”
Call Number:
TK5105.78
Read Now
40
Intrusion detection in wireless ad-hoc networks
Published 2014
CRC Press
Table of Contents:
“
... Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN
Security
...
”
Call Number:
TK5102.85
1
2
3
4
5
6
7
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 331 - Labor economics
Year of Publication
From:
To:
Classification
331 - Labor economics
005 - Computer programming, programs & data
98
374 - Adult education
24
384 - Communications; telecommunication
19
364 - Criminology
14
004 - Data processing & computer science
13
more ...
500 - Natural sciences & mathematics
13
658 - General management
13
620 - Engineering & allied operations
11
000 - Computer science, information & general works
7
006 - Special computer methods
4
330 - Economics
4
338 - Production
3
001 - Knowledge
2
302 - Social interaction
2
381 - Commerce
2
621 - Applied physics
2
745 - Decorative arts
2
300 - Social sciences
1
see all ...
less ...
Language
English
121
German
2
Undetermined
2
Collection
O'Reilly
125
Author
Santos, Omar
4
Beaver, Kevin
3
Messier, Ric
3
ACI Learning
2
Chapple, Mike
2
DeFranco, Joanna F.
2
more ...
Haber, Morey J.
2
Krutz, Ronald L.
2
Lowrie, Daniel
2
Nickel, Jochen
2
Pathan, Al-Sakib Khan
2
Piens, Tom
2
Williams, Branden R.
2
Abrol, Satyen
1
Abu-Nimeh, Saeed
1
Adamson, James K.
1
Agarwal, Monika
1
Akanbi, Oluwatobi Ayodeji
1
Akhgar, Babak
1
Alazab, Mamoun
1
Amiri, Iraj Sadegh
1
Anderson, Neil
1
Andress, Jason
1
Arabnia, Hamid
1
Ashok, Alaknanda
1
Azad, Saiful
1
Bachrach, Daniel G.
1
Barken, Lee
1
Barrett, Diane
1
Bauhaus, Mark
1
Behl, Akhil
1
Bergman, Neil
1
Bermel, Eric
1
Bhardwaj, Anuj
1
Bhattacharjee, Sravani
1
Bidgoli, Hossein
1
Bosworth, Seymour
1
Campagna, Rich
1
Campagna, Rich R.
1
Carroll, Brandon
1
Cerra, Allison
1
Chaki, Nabendu
1
Chaki, Rituparna
1
Chapman, Jerry W.
1
Chuvakin, Anton A.
1
Clark, Chris
1
Cole, Eric
1
Conklin, Wm. Arthur
1
Conti, Greg
1
Contos, Brian T.
1
Cothren, Chuck
1
Cross, Michael
1
Dalziel, Henry
1
Davis, Roger
1
Doherty, Jim
1
Dulaney, Emmett A.
1
Dumka, Ankur
1
Dunham, Ken
1
Dunkerley, Dawn
1
Dwivedi, Himanshu
1
Dykstra, Josiah
1
Easttom, William
1
El Khoury, Franjieh
1
Estrela, Vania Vieira
1
Evelyn, Geoff
1
Fati, Suliman Mohamed
1
Fazeldehkordi, Elahe
1
Firtman, Maximiliano R.
1
Flickenger, Rob
1
Frahim, Jazib
1
Furnell, Steven
1
Gajjar, Manish J.
1
Gallagher, Patrick
1
Garbis, Jason
1
Garfinkel, Simson
1
Garner, Nick
1
Gibson, Darril
1
Gillis, Tom
1
Gonzalez, Deborah
1
Goodwin, Sophie
1
Grobman, Steve
1
Groom, Frank M.
1
Groom, Kevin M.
1
Gupta, Aditya
1
Guzman, Aaron
1
Hagar, Jon Duncan
1
Haines, Brad
1
Heary, Jamey
1
Heatherly, Raymond
1
Hibbert, Brad
1
Hjörleifsson, Michele
1
Hoffman, Daniel
1
Hoog, Andrew
1
Hurley, Chris
1
IT, BCS The Chartered Institute for
1
Irwin, J. David
1
Israr, Nauman
1
Issac, Biju
1
Iyer, Sibbu
1
Jeyanthi, N.
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?page=2&filter%5B%5D=dewey-ones%3A%22331+-+Labor+economics%22&lookfor=Mobile+Computing+%2F+Security+Measures&type=AllFields
Send by Email
×
Loading...