1
by Brumfield, Cynthia, Haugli, Brian
Published 2022
John Wiley & Sons, Inc.
Table of Contents: ...5. Monitor Mobile Code Applications (e.g., Java Applets) for Malicious Activity by Authenticating...