1
by Lim, Ian, Coolidge, E. Coleen, Hourani, Paul
Published 2013
CRC Press/Taylor & Francis
Subjects: ...Mobile computing / Security measures...

2
Published 2017
Syngress
Table of Contents: ...1. Mobile security and privacy / M.H. Au, K.-K.R. Choo -- 2. Mobile security : a practitioner...

3
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...

4
by Andrews, Scott
Published 2013
IBM Corp., International Technical Support Organization
Subjects: ...Mobile computing / Security measures...

5
by Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents: ...Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...

6
by Leon, John Daniel
Published 2018
Packt Publishing
Subjects: ...Mobile computing / Security measures...

7
Published 2011
British Informatics Society
Table of Contents: ... are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot...

8
by Nakhjiri, Madjid
Published 2005
John Wiley & Sons
Table of Contents: ... -- Internet security and key exchange basics -- Introduction on Internet mobility protocols -- Remote access...

9
by Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents: ...Begriffsdefinitionen und KonzepteSecurity Labels; Spezifikation von Zugriffskontrollrichtlinien...

10
by Gonzalez, Deborah
Published 2015
Butterworth-Heinemann
Table of Contents: ... INSTITUTIONS; HIGHER EDUCATION (FERPA); PROFESSIONAL TRADE OVERSIGHT AND ORGANIZATIONS: MOBILE; OTHER FEDERAL...

11
by Dubey, Abhishek
Published 2013
CRC Press
Table of Contents: ...Introduction -- Android architecture -- Android application architecture -- Android (in)security...

12
by Dunham, Ken
Published 2009
Syngress Pub.
Table of Contents: ... of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures...

13
by Campagna, Rich R.
Published 2011
Wiley Pub.
Table of Contents: ...pt. 1. Living securely in the smart world -- pt. 2. Implementing enterprise mobile security -- pt...

14
by Osterhage, Wolfgang
Published 2011
CRC Press
Table of Contents: ...1. Introduction -- 2. WLAN -- 3. PDAs -- 4. Mobile phones -- 5. Bluetooth -- 6. Infrared -- 7...

15
by Glaser, J. D.
Published 2014
Auerbach Publications
Table of Contents: ...; Biography; Chapter 1: Introduction to Mobile Security Development; Chapter 2: Web Application Attack Surface...

16
Published 2018
John Wiley & Sons
Table of Contents: ... 3.2.5.4 5G Security Threat Analysis 69 3.3 Mobile Security Lifecycle Functions 70 3.3.1 Secure Device...

17 Subjects: ...Mobile computing / Security measures...

18
by Hagar, Jon Duncan
Published 2014
CRC Press
Table of Contents: ... and/or mobile phone attacks -- Mobile/embedded security -- Generic attacks -- Mobile and embedded system labs...

19
by Abdel-Hamid, Ahmed, Andrews, Scott, Arsanjani, Ali
Published 2015
IBM Corporation, International Technical Support Organization
Subjects: ...Mobile computing / Security measures...

20
by Bergman, Neil
Published 2013
McGraw-Hill
Table of Contents: ... -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile...