1
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...

2
by Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents: ...Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...

3
by Leon, John Daniel
Published 2018
Packt Publishing
Subjects: ...Mobile computing / Security measures...

4
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

5
by Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents: ...pt. 1. Living securely in the smart world -- pt. 2. Implementing enterprise mobile security -- pt...

6
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. WLAN -- 3. PDAs -- 4. Mobile phones -- 5. Bluetooth -- 6. Infrared -- 7...

7
by Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents: ...; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface...

8
Published 2018
John Wiley & Sons
Table of Contents: ... 3.2.5.4 5G Security Threat Analysis 69 3.3 Mobile Security Lifecycle Functions 70 3.3.1 Secure Device...

9 Subjects: ...Mobile computing / Security measures...

10
by Bergman, Neil
Published 2013
McGraw-Hill
Table of Contents: ... -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile...

11
by Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents: ... Payment and Access Systems -- Wireless Security Platforms and Functionality -- Mobile Subscription...

12
by Dunkerley, Mark
Published 2015
Packt Publishing
Table of Contents: ... engine; Other security controls; Summary; Chapter 5: Mobile Device Management; Mobile Device Management...

13
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

14
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ...1. Fundamentals of physical layer security -- 2. Coding for wiretap channels -- 3. LDPC codes...

15
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ... of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks...

16
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

17
Published 2014
CRC Press
Table of Contents: ... Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN Security...

18
by Goransson, Paul
Published 2007
Newnes/Elsevier
Table of Contents: .... The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r...

19
by Haines, Brad
Published 2008
Syngress Pub.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

20 Subjects: ...Image processing / Security measures...