1
by Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents: ...; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface...

2
by Abdel-Hamid, Ahmed, Andrews, Scott, Arsanjani, Ali
Published 2015
IBM Corporation, International Technical Support Organization
Subjects: ...Mobile computing / Security measures...

3
by Kite, Robert
Published 2010
Peachpit Press
Subjects: ...Macintosh (Computer) / Security measures / blmlsh...

4
by Gong, Lidong Chen. Guang
Published 2012
Chapman and Hall/CRC
Table of Contents: ... for Mobility ; Challenges in Establishing Protection for a Mobile Node; Secure Handover in UMTS and LTE...

5
by Velu, Vijay Kumar
Published 2016
Packt Publishing
Table of Contents: ...; Reporting; The OWASP mobile security project; OWASP mobile top 10 risks; Vulnerable applications to practice...

6
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ... of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks...

7
by Gillis, Tom
Published 2010
Cisco Press
Table of Contents: ...Network security : yesterday, today, and tomorrow -- Collaboration and web 2.0 technologies...

8
by Goransson, Paul
Published 2007
Newnes/Elsevier
Table of Contents: .... The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r...

9
by Haines, Brad
Published 2008
Syngress Pub.
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

10 Subjects: ...Image processing / Security measures...

11
Published 2011
Chapman and Hall/CRC
Table of Contents: ... Reading and Web Sites Mobile Security, Jan Audestad; The GSM Security; 3G Architecture; Extent...

12
by El Khoury, Franjieh
Published 2013
CRC Press
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

13
by DeFranco, Joanna F.
Published 2014
CRC Press
Table of Contents: ...1. Security threats -- 2. Cyber security and digital forensics careers -- 3. Cyber security -- 4...

14
by Nascimento, Adolfo Eloy
Published 2017
Packt Publishing
Subjects: ...Application program interfaces (Computer software) / Security measures...

15
by Rajani, Renu
Published 2017
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

16
by Flickenger, Rob
Published 2003
O'Reilly
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

17
by Zeng, Kai
Published 2011
Wiley
Table of Contents: ... -- Opportunistic Routing Security -- Opportunistic Broadcasts in Vehicular Networks -- Conclusions and future...

18
by Lin, Zihuai
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...hardware security...

19
by Timmis, Harold
Published 2011
Apress
Table of Contents: ... an Alarm System Using the Arduino; Basic Security System; Requirements Gathering and Creating...

20
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Monitoring and Measuring -- Vision-Based Tracking for Mobile Augmented Reality -- Rights Management...