Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: Mobile Computing / Security Measures
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"384 - Communications; telecommunication"
Showing
1
-
20
of
30
Search:
'Mobile Computing / Security Measures'
,
query time: 0.67s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Mobile
application
security
by
Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents:
“
...Cover Page --
Mobile
Application
Security
-- Copyright Page -- About the Authors -- Dedication...
”
Call Number:
TK5102.85
Read Now
2
Mobile
Security
: a Pocket Guide
by
Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents:
“
...Chapter 1: getting
mobile
; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...
”
Call Number:
QA76.59
Read Now
3
Security
with Go : explore the power of Golang to secure host, web, and cloud services
by
Leon, John Daniel
Published 2018
Packt Publishing
Subjects:
“
...
Mobile
computing
/
Security
measures
...
”
Call Number:
QA76.59
Read Now
4
Netzsicherheit : Grundlagen & Protokolle - Mobile & drahtlose Kommunikation - Schutz von Kommunikationsinfrastrukturen
by
Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents:
“
...Begriffsdefinitionen und Konzepte
Security
Labels; Spezifikation von Zugriffskontrollrichtlinien...
”
Call Number:
QA76.9
Read Now
5
Mobile
malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents:
“
... of
mobile
malware -- Debugging and disassembly of MMC --
Mobile
malware mitigation
measures
...
”
Call Number:
TK5102.85
Read Now
6
Mobile
device
security
for dummies
by
Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents:
“
...pt. 1. Living
securely
in the smart world -- pt. 2. Implementing enterprise
mobile
security
-- pt...
”
Call Number:
TK5102.85
Read Now
7
Wireless
security
by
Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents:
“
...1. Introduction -- 2. WLAN -- 3. PDAs -- 4.
Mobile
phones -- 5. Bluetooth -- 6. Infrared -- 7...
”
Call Number:
TK5103.2
Read Now
8
Secure
development for
mobile
apps : how to design and code secure mobile applications with PHP and JavaScript
by
Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents:
“
...; Biography; Chapter 1: Introduction to
Mobile
Security
Development; Chapter 2: Web Application Attack Surface...
”
Call Number:
QA76.9.A25
Read Now
9
Comprehensive guide to 5G
security
Published 2018
John Wiley & Sons
Table of Contents:
“
... 3.2.5.4 5G
Security
Threat Analysis 69 3.3
Mobile
Security
Lifecycle Functions 70 3.3.1
Secure
Device...
”
Call Number:
TK5103.2
Read Now
10
Intelligent
mobile
malware detection
by
Thomas, Tony
,
John, Teenu S.
,
Surendran, Roopak
,
Alazab, Mamoun
Published 2023
CRC Press
Subjects:
“
...
Mobile
computing
/
Security
measures
...
”
Call Number:
TK5105.59
Read Now
11
Hacking exposed : mobile security secrets & solutions
by
Bergman, Neil
Published 2013
McGraw-Hill
Table of Contents:
“
... --
Mobile
Services and
Mobile
Web --
Mobile
Device Management --
Mobile
Development
Security
--
Mobile
...
”
Call Number:
TK5105.59
Read Now
12
Wireless communications
security
: solutions for the internet of things
by
Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents:
“
... Payment and Access Systems -- Wireless
Security
Platforms and Functionality --
Mobile
Subscription...
”
Call Number:
TK5103.2
Read Now
13
Learning AirWatch : learn to implement, manage, and deploy the latest Enterprise Mobility Management (EMM) platform offered by AirWatch
by
Dunkerley, Mark
Published 2015
Packt Publishing
Table of Contents:
“
... engine; Other
security
controls; Summary; Chapter 5:
Mobile
Device Management;
Mobile
Device Management...
”
Call Number:
HF5548.34
Read Now
14
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
by
Bachrach, Daniel G.
,
Rzeszut, Eric J.
Published 2014
Apress
Table of Contents:
“
... to Your Digital Life;
Mobile
Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...
”
Call Number:
QA76.9.A25
Read Now
15
Communication System
Security
by
Gong, Lidong Chen. Guang
Published 2012
Chapman and Hall/CRC
Table of Contents:
“
... for
Mobility
; Challenges in Establishing Protection for a
Mobile
Node;
Secure
Handover in UMTS and LTE...
”
Call Number:
TK5105.59
Read Now
16
Physical layer
security
in wireless communications
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents:
“
...1. Fundamentals of physical layer
security
-- 2. Coding for wiretap channels -- 3. LDPC codes...
”
Call Number:
TK5103.2
Read Now
17
Security
for multihop wireless networks
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents:
“
... of
Security
Attacks in MANETs; Chapter 2:
Security
and Privacy for Routing Protocols in
Mobile
Ad Hoc Networks...
”
Call Number:
TK5103.2
Read Now
18
Securing
the borderless network : security for the web 2.0 world
by
Gillis, Tom
Published 2010
Cisco Press
Table of Contents:
“
...Network
security
: yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...
”
Call Number:
TK5105.88817
Read Now
19
Intrusion detection in wireless ad-hoc networks
Published 2014
CRC Press
Table of Contents:
“
... Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN
Security
...
”
Call Number:
TK5102.85
Read Now
20
Secure
roaming in 802.11 networks
by
Goransson, Paul
Published 2007
Newnes/Elsevier
Table of Contents:
“
.... The 802.11 Workgroups' Solutions for Fast
Secure
Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r...
”
Call Number:
TK5105.78
1
2
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 384 - Communications; telecommunication
Year of Publication
From:
To:
Classification
384 - Communications; telecommunication
005 - Computer programming, programs & data
19
331 - Labor economics
18
620 - Engineering & allied operations
10
621 - Applied physics
6
500 - Natural sciences & mathematics
4
more ...
658 - General management
4
004 - Data processing & computer science
3
364 - Criminology
3
006 - Special computer methods
2
001 - Knowledge
1
302 - Social interaction
1
374 - Adult education
1
381 - Commerce
1
745 - Decorative arts
1
see all ...
less ...
Language
English
28
German
1
Undetermined
1
Collection
O'Reilly
30
Author
Abd el-Samie, Fathi E.
1
Abro, Ahmed Bux
1
Abu-Nimeh, Saeed
1
Ahmad, Ijaz
1
Ahmadi, Sassan
1
Ahmed, Hossam Eldin H.
1
more ...
Alazab, Mamoun
1
Allen, Ben
1
Azad, Saiful
1
Bachrach, Daniel G.
1
Bauhaus, Mark
1
Bergman, Neil
1
Campagna, Rich R.
1
Chaki, Nabendu
1
Chaki, Rituparna
1
Clark, Chris
1
De la Roche, Guillaume
1
Dunham, Ken
1
Dunkerley, Mark
1
Dwivedi, Himanshu
1
Elashry, Ibrahim F.
1
Enders, Brenda J.
1
Fati, Suliman Mohamed
1
Flickenger, Rob
1
Furnell, Steven
1
Gillis, Tom
1
Glaser, J. D.
1
Glazunov, Andres Alayon
1
Gong, Lidong Chen. Guang
1
Goransson, Paul
1
Greenlaw, Raymond
1
Gurtov, Andrei
1
Haines, Brad
1
Iyer, Sibbu
1
John, Teenu S.
1
Khan, Shafiullah
1
Krishnan, Ashwin
1
Leon, John Daniel
1
Li, Ming
1
Linn, Heather
1
Liyanage, Madhusanka
1
Lloret Mauri, Jaime
1
Lou, Wenjing
1
Nutting, Ray
1
Osterhage, Wolfgang
1
Pathan, Al-Sakib Khan
1
Penttinen, Jyrki T. J.
1
Rouse, Jason
1
Roßberg, Michael
1
Rzeszut, Eric J.
1
Scambray, Joel
1
Schearer, Michael J.
1
Schäfer, Günter
1
Shahieen, Mai H.
1
Song, Lingyang
1
Stanfield, Mike
1
Surendran, Roopak
1
Thiel, David V.
1
Thomas, Tony
1
Thornton, Frank
1
Zeng, Kai
1
Zhang, Yan
1
Zhou, Xiangyun Sean
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22384+-+Communications%3B+telecommunication%22&lookfor=Mobile+Computing+%2F+Security+Measures&type=AllFields
Send by Email
×
Loading...