1
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...

2
by Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents: ...Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...

3
by Leon, John Daniel
Published 2018
Packt Publishing
Subjects: ...Mobile computing / Security measures...

4
by Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents: ...Begriffsdefinitionen und KonzepteSecurity Labels; Spezifikation von Zugriffskontrollrichtlinien...

5
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

6
by Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents: ...pt. 1. Living securely in the smart world -- pt. 2. Implementing enterprise mobile security -- pt...

7
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. WLAN -- 3. PDAs -- 4. Mobile phones -- 5. Bluetooth -- 6. Infrared -- 7...

8
by Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents: ...; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface...

9
Published 2018
John Wiley & Sons
Table of Contents: ... 3.2.5.4 5G Security Threat Analysis 69 3.3 Mobile Security Lifecycle Functions 70 3.3.1 Secure Device...

10 Subjects: ...Mobile computing / Security measures...

11
by Bergman, Neil
Published 2013
McGraw-Hill
Table of Contents: ... -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile...

12
by Penttinen, Jyrki T. J.
Published 2017
John Wiley & Sons
Table of Contents: ... Payment and Access Systems -- Wireless Security Platforms and Functionality -- Mobile Subscription...

13
by Dunkerley, Mark
Published 2015
Packt Publishing
Table of Contents: ... engine; Other security controls; Summary; Chapter 5: Mobile Device Management; Mobile Device Management...

14
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

15
by Gong, Lidong Chen. Guang
Published 2012
Chapman and Hall/CRC
Table of Contents: ... for Mobility ; Challenges in Establishing Protection for a Mobile Node; Secure Handover in UMTS and LTE...

16
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ...1. Fundamentals of physical layer security -- 2. Coding for wiretap channels -- 3. LDPC codes...

17
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ... of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks...

18
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

19
Published 2014
CRC Press
Table of Contents: ... Technique -- Intrusion Detection for Wireless Mesh Networks -- Future Trends in WAN Security...

20
by Goransson, Paul
Published 2007
Newnes/Elsevier
Table of Contents: .... The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r...