1
by Karjaluoto, Heikki
Published 2008
Edward Elgar
Subjects: ...Business enterprises / Computer networks / Security measures...

2
by Kebschull, Udo
Published 2023
Springer Berlin Heidelberg
Table of Contents: ... -- 6 Mobile Hacking -- 7 Internet of Things -- Teil III Abwehr von Cyberattacken -- 8 Allgemeine...

3
by Klett, Gerhard, Kersten, Heinrich
Published 2015
mitp
Subjects: ...Business enterprises / Computer networks / Security measures / http://id.loc.gov/authorities...

4
Published 2019
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

5
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...Computer security incident response teams / Michael Miora, M.E. Kabay, and Bernie Cowens -- Data...

6
Published 2024
Springer Nature Switzerland
Table of Contents: ...The Importance of Soft Skills for Computing Gradu-ates in the Context of the Fifth Industrial...

7
by Dunkerley, Mark
Published 2015
Packt Publishing
Table of Contents: ... engine; Other security controls; Summary; Chapter 5: Mobile Device Management; Mobile Device Management...

8
by Svidergol, Brian, Clements, Bob
Published 2019
Microsoft
Subjects: ...Mobile computing / Security measures / Examinations / Study guides...

9
by Bachrach, Daniel G., Rzeszut, Eric J.
Published 2014
Apress
Table of Contents: ... to Your Digital Life; Mobile Law; Insecure Background Wireless Networks; Don't Trust a Wireless Network...

10
by Messier, Ric
Published 2014
Syngress
Table of Contents: ...; Conclusion; Summary; Further reading; 7 Mobile Computing; Introduction; Smartphones; Apps; Jailbreaking...

11
by Bhattacharjee, Sravani
Published 2018
Packt Publishing
Table of Contents: ...; Trustworthiness of an IIoT system; Industrial big data pipeline and architectures; Industrial IoT security...

12
by Lakhani, Aamir
Published 2024
Pearson
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...

13
Published 2022
Pearson IT Certification
Subjects: ...Computer networks / Security measures / Examinations / fast...

14 Table of Contents: ... Security Through Trust in Mobile Ad-Hoc Networks Using Soft Computing Methods -- 4. Prooof of Virture...

15
by Haber, Morey J., Hibbert, Brad
Published 2018
Apress, Distributed to the Book trade worldwide by Springer
Table of Contents: ... 16: Mobile Devices -- Chapter 17: Ransomware -- Chapter 18: Secured DevOps (SDevOps) -- Chapter 19...

16
by Haber, Morey J.
Published 2020
Apress
Table of Contents: ... (IoT) -- Chapter 15: The Cloud -- Chapter 16: Mobile Devices -- Chapter 17: Ransomware and Privileges...

17
by Miguel, Jorge
Published 2016
Academic Press
Table of Contents: ...3.4.3 Secure P2P e-Assessment3.4.4 P2P e-Assessment and Social Networks; 3.4.5 Security Limitations...

18
Published 2024
John Wiley & Sons, Inc.
Table of Contents: ... Domains. Enhancing Security in Cloud Computing using Artificial Intelligence (AI). Utilization of Deep...

19
by Castaldo, Chris
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Assessments 129 -- Cloud Security Alliance 130 -- Vendor Security Alliance 130 -- Sharing Data with Your...

20
by Rajani, Renu
Published 2017
Packt Publishing
Subjects: ...Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277...