Search Results for Mobile computing -- Security measures.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dMobile$002bcomputing$002b--$002bSecurity$002bmeasures.$0026te$003dILS$0026ps$003d300?dt=list2024-12-23T04:23:06ZMobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:4591222024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Au, Man-Ho, editor. Choo, Raymond Kim-Kwang, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128046296">https://www.sciencedirect.com/science/book/9780128046296</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Raggo, Michael T.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScriptent://SD_ILS/0/SD_ILS:3563672024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Glaser, J. D., author.<br/>Preferred Shelf Number ONLINE(356367.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482209044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android malware and analysisent://SD_ILS/0/SD_ILS:3564002024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Dunham, Ken, author. Hartman, Shane, author. Morales, Jose Andre, author. Quintans, Manu, author. Strazzere, Tim, author.<br/>Preferred Shelf Number ONLINE(356400.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482252200">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software test attacks to break mobile and embedded devicesent://SD_ILS/0/SD_ILS:3428682024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Hagar, Jon Duncan, author.<br/>Preferred Shelf Number ONLINE(342868.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android security attacks and defensesent://SD_ILS/0/SD_ILS:2871932024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Misra, Anmol.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing cloud and mobility a practitioner's guideent://SD_ILS/0/SD_ILS:3428392024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Lim, Ian. Hourani, Paul. Coolidge, E. Coleen.<br/>Preferred Shelf Number ONLINE(342839.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466550827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Securing cloud and mobility a practitioner's guideent://SD_ILS/0/SD_ILS:2900012024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Lim, Ian. Hourani, Paul. Coolidge, E. Coleen.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439850572">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android forensics investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1452532024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Hoog, Andrew. McCash, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile application securityent://SD_ILS/0/SD_ILS:2933122024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security of mobile communicationsent://SD_ILS/0/SD_ILS:2866052024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Boudriga, Noureddine.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780849379420">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292024-12-23T04:23:06Z2024-12-23T04:23:06ZAuthor Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>