1
by Karjaluoto, Heikki
Published 2008
Edward Elgar
Subjects: ...Business enterprises / Computer networks / Security measures...

2
by Kebschull, Udo
Published 2023
Springer Berlin Heidelberg
Table of Contents: ... -- 6 Mobile Hacking -- 7 Internet of Things -- Teil III Abwehr von Cyberattacken -- 8 Allgemeine...

3
by Klett, Gerhard, Kersten, Heinrich
Published 2015
mitp
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

4
Published 2019
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

5
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Computer security incident response teams / Michael Miora, M.E. Kabay, and Bernie Cowens -- Data...

6
by Dunkerley, Mark
Published 2015
Packt Publishing
Table of Contents: ... engine; Other security controls; Summary; Chapter 5: Mobile Device Management; Mobile Device Management...

7
by Svidergol, Brian, Clements, Bob
Published 2019
Microsoft
Subjects: ...Mobile computing / Security measures / Examinations / Study guides...

8
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

9
by Messier, Ric
Published 2014
Syngress
Table of Contents: ...; Conclusion; Summary; Further reading; 7 Mobile Computing; Introduction; Smartphones; Apps; Jailbreaking...

10
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

11
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

12
Published 2022
Pearson IT Certification
Subjects: ...Computer networks / Security measures / Examinations / fast...

13 Table of Contents: ... Security Through Trust in Mobile Ad-Hoc Networks Using Soft Computing Methods -- 4. Prooof of Virture...

14
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19...

15
by Haber, Morey J.
Published 2020
Apress
Table of Contents: ... (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware and Privileges...

16
by Miguel, Jorge
Published 2016
Academic Press
Table of Contents: ...3.4.3 Secure P2P e-Assessment3.4.4 P2P e-Assessment and Social Networks; 3.4.5 Security Limitations...

17
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep...

18
by Castaldo, Chris
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Assessments 129 -- Cloud Security Alliance 130 -- Vendor Security Alliance 130 -- Sharing Data with Your...

19
by Rajani, Renu
Published 2017
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

20
by Enders, Brenda J.
Published 2013
McGraw-Hill Education
Table of Contents: ... -- Defining and Measuring the Success of Your Mobile Learning Initiative -- Manager's Checklist for Chapter 5...