1
by Tamma, Rohit, Skulkin, Oleg, Mahalik, Heather, Bommisetty, Satish
Published 2018
Packt Publishing
Subjects: ...Mobile computing / Security measures...

2
Published 2014
CRC Press, Taylor & Francis Group
Table of Contents: ... of Security Attacks in MANETs; Chapter 2: Security and Privacy for Routing Protocols in Mobile Ad Hoc Networks...

3
Published 2022
CRC Press
Table of Contents: ...1. Security enhanced cloud for Serverless Computing and its applications -- 2. Revealing the Web...

4
by Goransson, Paul
Published 2007
Newnes/Elsevier
Table of Contents: .... The 802.11 Workgroups' Solutions for Fast Secure Roaming; 9.1 Introduction; 9.2 Overview of the 802.11r...

5
by Zdziarski, Jonathan A.
Published 2008
O'Reilly Media
Table of Contents: .... Introduction to Computer Forensics; Rules of Evidence; Good Forensic Practices; Document the Evidence; Document...

6
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ...10.14 Summary 302 -- 11 Measurements 305 Yoshihisa Kishiyama and Tetsuro Imai -- 11.1 Introduction...

7
by Timmis, Harold
Published 2011
Apress
Table of Contents: ... an Alarm System Using the Arduino; Basic Security System; Requirements Gathering and Creating...

8
Published 2018
John Wiley & Sons, Inc.
Table of Contents: ... -- 2.4.3 Classification Performance Measures 41 -- 2.5 Experimental Results 44 -- 2.5.1 TSS vs. OFS...

9
by De la Roche, Guillaume
Published 2013
Wiley
Table of Contents: ... Cognitive Radio Networks: Sensing, Access, Security 443 / Ghazanfar A. Safdar -- 16.1 Introduction 443...

10
Published 2015
CRC Press/Balkema
Table of Contents: ... of mobile platforms; Optimization of HF-SCF on CPU-GPU Hybrid Parallel Computing infrastructure; Next...