Arama Sonu&ccedil;lar&#305; Mobile computing -- Security measures. SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMobile$002bcomputing$002b--$002bSecurity$002bmeasures.$0026ps$003d300? 2024-11-10T11:22:04Z Mobile security and privacy : advances, challenges and future research directions ent://SD_ILS/0/SD_ILS:459122 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Au, Man-Ho, editor.&#160;Choo, Raymond Kim-Kwang, editor.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128046296">https://www.sciencedirect.com/science/book/9780128046296</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile data loss : threats and countermeasures ent://SD_ILS/0/SD_ILS:458729 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Raggo, Michael T.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android malware and analysis ent://SD_ILS/0/SD_ILS:356400 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Dunham, Ken, author.&#160;Hartman, Shane, author.&#160;Morales, Jose Andre, author.&#160;Quintans, Manu, author.&#160;Strazzere, Tim, author.<br/>Yer Numaras&#305;&#160;ONLINE(356400.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482252200">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript ent://SD_ILS/0/SD_ILS:356367 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Glaser, J. D., author.<br/>Yer Numaras&#305;&#160;ONLINE(356367.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781482209044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Software test attacks to break mobile and embedded devices ent://SD_ILS/0/SD_ILS:342868 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Hagar, Jon Duncan, author.<br/>Yer Numaras&#305;&#160;ONLINE(342868.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android security attacks and defenses ent://SD_ILS/0/SD_ILS:287193 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Misra, Anmol.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing cloud and mobility a practitioner's guide ent://SD_ILS/0/SD_ILS:342839 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Lim, Ian.&#160;Hourani, Paul.&#160;Coolidge, E. Coleen.<br/>Yer Numaras&#305;&#160;ONLINE(342839.1)<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781466550827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Securing cloud and mobility a practitioner's guide ent://SD_ILS/0/SD_ILS:290001 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Lim, Ian.&#160;Hourani, Paul.&#160;Coolidge, E. Coleen.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9781439850572">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile application security ent://SD_ILS/0/SD_ILS:293312 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Dwivedi, Himanshu.&#160;Clark, Chris, 1980-&#160;Thiel, David V.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Android forensics investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:145253 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Hoog, Andrew.&#160;McCash, John.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Security of mobile communications ent://SD_ILS/0/SD_ILS:286605 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Boudriga, Noureddine.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;<a href="http://marc.crcnetbase.com/isbn/9780849379420">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:146413 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Dunham, Ken.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/> AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobility ent://SD_ILS/0/SD_ILS:295729 2024-11-10T11:22:04Z 2024-11-10T11:22:04Z Yazar&#160;Nakhjiri, Madjid.&#160;Nakhjiri, Mahsa.<br/>Yer Numaras&#305;&#160;ONLINE<br/>Elektronik Eri&#351;im&#160;John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format:&#160;Elektrnik Kaynak<br/>Durum&#160;&Ccedil;evrimi&ccedil;i K&uuml;t&uuml;phane~1<br/>