1
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...

2
by Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents: ...Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...

3
by Nakhjiri, Madjid
Published 2005
John Wiley & Sons
Table of Contents: ... -- Internet security and key exchange basics -- Introduction on Internet mobility protocols -- Remote access...

4
Published 2011
British Informatics Society
Table of Contents: ... are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot...

5
by Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents: ...Begriffsdefinitionen und KonzepteSecurity Labels; Spezifikation von Zugriffskontrollrichtlinien...

6
by Gonzalez, Deborah
Published 2015
Butterworth-Heinemann
Table of Contents: ... INSTITUTIONS; HIGHER EDUCATION (FERPA); PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE; OTHER FEDERAL...

7
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

8
by Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents: ...pt. 1. Living securely in the smart world -- pt. 2. Implementing enterprise mobile security -- pt...

9
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. WLAN -- 3. PDAs -- 4. Mobile phones -- 5. Bluetooth -- 6. Infrared -- 7...

10 Subjects: ...Mobile computing / Security measures...

11
by Hagar, Jon Duncan
Published 2014
CRC Press
Table of Contents: ... and/or mobile phone attacks -- Mobile/embedded security -- Generic attacks -- Mobile and embedded system labs...

12
by Bergman, Neil
Published 2013
McGraw-Hill
Table of Contents: ... -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile...

13
by Klett, Gerhard, Kersten, Heinrich
Published 2015
mitp
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

14
by Kite, Robert
Published 2010
Peachpit Press
Subjects: ...Macintosh (Computer) / Security measures / blmlsh...

15
Published 2019
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

16 Table of Contents: ... -- Cloud Computing -- Cloud Types -- Cloud Service Providers -- Cloud Security Controls -- Security as a...

17
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Computer security incident response teams / Michael Miora, M.E. Kabay, and Bernie Cowens -- Data...

18
Published 2014
Auerbach
Table of Contents: ...<P>Survey of Secure Computing; <EM>Kuruvilla Mathew and Biju Issac<BR></EM>Feature Selection...

19
by Krutz, Ronald L.
Published 2010
Wiley Pub.
Table of Contents: ...CLOUD SECURITY: A Comprenhensive Guide to Secure Cloud Computing; Contents at a Glance; About...

20
by Nahari, Hadi
Published 2011
Wiley Pub.
Table of Contents: ...I: Overview of commerce -- Internet era: E-commerce -- Mobile commerce -- Important "ilities...