1
by Lim, Ian, Coolidge, E. Coleen, Hourani, Paul
Published 2013
CRC Press/Taylor & Francis
Subjects: ...Mobile computing / Security measures...

2
Published 2017
Syngress
Table of Contents: ...1. Mobile security and privacy / M.H. Au, K.-K.R. Choo -- 2. Mobile security : a practitioner...

3
by Dwivedi, Himanshu
Published 2010
McGraw-Hill
Table of Contents: ...Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication...

4
by Andrews, Scott
Published 2013
IBM Corp., International Technical Support Organization
Subjects: ...Mobile computing / Security measures...

5
Published 2022
Springer Nature Singapore
Table of Contents: .... ATM Security using IRIS Recognition -- Chapter 8. Reliable Data Acquisition by Master Slave Approach...

6
Published 2022
Springer Nature Singapore
Table of Contents: ... -- Chapter 3. Keyword Recognition from EEG Signals on Smart Devices a Novel Approach -- Chapter 4. Security...

7
Published 2023
Springer Nature Singapore
Table of Contents: ...Measuring the technical efficiency of Thai rubber export using the spatial stochastic frontier...

8
by Furnell, Steven
Published 2009
IT Governance Pub.
Table of Contents: ...Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4...

9
by Gonzalez, Deborah
Published 2015
Elsevier, Butterworth-Heinemann
Subjects: ...Computer networks / Security measures...

10
Published 2021
Springer Nature Singapore
Table of Contents: ... -- Real Time Human Locator and Advance Home Security Appliances -- A Novel Implementation of Haptic...

11
Published 2011
British Informatics Society
Table of Contents: ... are personally liable; taking security measures; are business people breaking the law; 8 stopping the mobile bot...

12
Published 2023
Springer Nature Singapore
Table of Contents: ... Board Fault Analysis with Object Extraction and Measurements -- Gamification of Knowledge Management...

13
Published 2023
Springer Nature Singapore
Table of Contents: ...: Vehicle Detection in Autonomous Vehicles using Computer Vision -- Chapter 3: Analysis of the Volume...

14
by Nakhjiri, Madjid
Published 2005
John Wiley & Sons
Table of Contents: ... -- Internet security and key exchange basics -- Introduction on Internet mobility protocols -- Remote access...

15
by Karjaluoto, Heikki
Published 2008
Edward Elgar
Subjects: ...Business enterprises / Computer networks / Security measures...

16
Published 2023
Springer International Publishing
Table of Contents: ...Crowdsourcing as a Future Collaborative Computing Paradigm -- Urban Mobility-Driven Crowdsensing...

17
by Schäfer, Günter
Published 2014
Dpunkt.verlag
Table of Contents: ...Begriffsdefinitionen und KonzepteSecurity Labels; Spezifikation von Zugriffskontrollrichtlinien...

18
Published 2021
Springer International Publishing
Table of Contents: ... Multicasting in Mobile Edge Computing” -- 11. “Blockchain-based Security Servicesfor Fog Computing”. Part V...

19
by Leon, John Daniel
Published 2018
Packt Publishing
Subjects: ...Mobile computing / Security measures...

20
by Wu, Chuan-Kun
Published 2021
Springer Nature Singapore
Table of Contents: ... comprehensive set of security measures for IoT....