1
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

2 Subjects: ...Mobile computing / Security measures...

3
by Bergman, Neil
Published 2013
McGraw-Hill
Table of Contents: ... -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile...

4
by Hoog, Andrew
Published 2011
Syngress
Table of Contents: ...Chapter 1 Android and Mobile Forensics Chapter 2 Android Hardware Platforms Chapter 3 Android...

5
by Messier, Ric
Published 2014
Syngress
Table of Contents: ...; Conclusion; Summary; Further reading; 7 Mobile Computing; Introduction; Smartphones; Apps; Jailbreaking...

6
by Shema, Mike
Published 2012
Syngress
Subjects: ...Computer programs / Security measures / fast...

7
Published 2013
Morgan Kaufmann/Elsevier
Table of Contents: .... Mobile and cloud computing -- part 4. Cyber crime and cyber terrorism -- part 5. Focus topics : from...

8
by Grobman, Steve, Cerra, Allison
Published 2016
Apress, Distributed by Springer Science+Business Media New York
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

9
Published 2017
O'Reilly Media, Inc.
Subjects: ...Operating systems (Computers) / Security measures / fast...

10
Published 2023
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

11
by DeFranco, Joanna F.
Published 2014
CRC Press
Table of Contents: ...1. Security threats -- 2. Cyber security and digital forensics careers -- 3. Cyber security -- 4...

12
by DeFranco, Joanna F., Maley, Bob
Published 2022
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

13
by Reddy, Niranjan
Published 2019
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
Table of Contents: ...: Network forensics -- Chapter 7: Mobile forensics -- Chapter 8: Cloud forensics -- Chapter 9: Investigating...

14
Published 2023
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

15
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep...

16 Table of Contents: ... Computing; Semantic Web; Semantic Web and Security; Cloud Computing Frameworks Based on Semantic Web...

17
by Sheward, Mike
Published 2018
BCS Learning & Development
Table of Contents: ...; CAPTURING; ANALYSIS; SUMMARY; 13 CLOUD FORENSICS; CLOUD COMPUTING TERMINOLOGY; ACQUISITION IN THE CLOUD...

18
by Shimonski, Robert
Published 2015
Syngress
Table of Contents: ... Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data...

19 Table of Contents: ...: Enterprise Cybersecurity for Mobile and BYOD -- Part III: The Art of Cyber Defense -- Chapter 8: Building...