Arama Sonuçları Mobile computing -- Security measures.SirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/tr_TR/default_tr/default_tr/qu$003dMobile$002bcomputing$002b--$002bSecurity$002bmeasures.$0026ps$003d300?2024-11-10T11:22:04ZMobile security and privacy : advances, challenges and future research directionsent://SD_ILS/0/SD_ILS:4591222024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Au, Man-Ho, editor. Choo, Raymond Kim-Kwang, editor.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128046296">https://www.sciencedirect.com/science/book/9780128046296</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile data loss : threats and countermeasuresent://SD_ILS/0/SD_ILS:4587292024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Raggo, Michael T.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128028643">https://www.sciencedirect.com/science/book/9780128028643</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Android malware and analysisent://SD_ILS/0/SD_ILS:3564002024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Dunham, Ken, author. Hartman, Shane, author. Morales, Jose Andre, author. Quintans, Manu, author. Strazzere, Tim, author.<br/>Yer Numarası ONLINE(356400.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781482252200">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScriptent://SD_ILS/0/SD_ILS:3563672024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Glaser, J. D., author.<br/>Yer Numarası ONLINE(356367.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781482209044">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Software test attacks to break mobile and embedded devicesent://SD_ILS/0/SD_ILS:3428682024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Hagar, Jon Duncan, author.<br/>Yer Numarası ONLINE(342868.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466575318">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Android security attacks and defensesent://SD_ILS/0/SD_ILS:2871932024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Misra, Anmol.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439896471">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing cloud and mobility a practitioner's guideent://SD_ILS/0/SD_ILS:3428392024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Lim, Ian. Hourani, Paul. Coolidge, E. Coleen.<br/>Yer Numarası ONLINE(342839.1)<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781466550827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Securing cloud and mobility a practitioner's guideent://SD_ILS/0/SD_ILS:2900012024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Lim, Ian. Hourani, Paul. Coolidge, E. Coleen.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9781439850572">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile application securityent://SD_ILS/0/SD_ILS:2933122024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Dwivedi, Himanshu. Clark, Chris, 1980- Thiel, David V.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://mhebooklibrary.com/reader/mobile-application-security">Subscription required</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Android forensics investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1452532024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Hoog, Andrew. McCash, John.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Security of mobile communicationsent://SD_ILS/0/SD_ILS:2866052024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Boudriga, Noureddine.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim <a href="http://marc.crcnetbase.com/isbn/9780849379420">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Dunham, Ken.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>AAA and network security for mobile access radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:2957292024-11-10T11:22:04Z2024-11-10T11:22:04ZYazar Nakhjiri, Madjid. Nakhjiri, Mahsa.<br/>Yer Numarası ONLINE<br/>Elektronik Erişim John Wiley <a href="http://dx.doi.org/10.1002/0470017465">http://dx.doi.org/10.1002/0470017465</a><br/>Format: Elektrnik Kaynak<br/>Durum Çevrimiçi Kütüphane~1<br/>