1
by Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents: ...; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface...

2
by Gong, Lidong Chen. Guang
Published 2012
Chapman and Hall/CRC
Table of Contents: ... for Mobility ; Challenges in Establishing Protection for a Mobile Node; Secure Handover in UMTS and LTE...

3
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ... of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks...

4
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

5
by Goransson, Paul
Published 2007
Newnes/Elsevier
Table of Contents: .... The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r...

6
by Haines, Brad
Published 2008
Syngress Pub.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

7 Subjects: ...Image processing / Security measures...

8
by Flickenger, Rob
Published 2003
O'Reilly
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

9
by Zeng, Kai
Published 2011
Wiley
Table of Contents: ... -- Opportunistic Routing Security -- Opportunistic Broadcasts in Vehicular Networks -- Conclusions and future...