Mobile computing -- Security measures
Resource Information
The concept Mobile computing -- Security measures represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
The Resource
Mobile computing -- Security measures
Resource Information
The concept Mobile computing -- Security measures represents the subject, aboutness, idea or notion of resources found in Mid-Continent Public Library.
- Label
- Mobile computing -- Security measures
27 Items that share the Concept Mobile computing -- Security measures
Context
Context of Mobile computing -- Security measuresSubject of
No resources found
No enriched resources found
- 10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
- AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
- Android apps security
- Android forensics : investigation, analysis, and mobile security for Google Android
- Android malware and analysis
- Android security : attacks and defenses
- Application security for the Android platform
- Extending IBM business process manager to the mobile enterprise with IBM worklight
- Hacking exposed : mobile security secrets & solutions
- Instant XenMobile MDM : a guide to effectively equipping mobile devices with configuration, security, provisioning, and support capabilities using XenMobile, the world's most popular mobile management software
- Mobile application security
- Mobile device security for dummies
- Mobile forensics cookbook : data acquisition, extraction, recovery techniques, and investigations using modern forensic tools
- Mobile malware attacks and defense
- Mobile security : a pocket guide
- Mobile security : how to secure, privatize, and recover your devices : keep your data secure on the go
- Practical mobile forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, and Windows Phone platforms
- Practical mobile forensics : dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide
- Pro iOS security and forensics : enterprise iPhone and iPad safety
- Secure development for mobile apps : how to design and code secure mobile applications with PHP and JavaScript
- Securing your mobile business with IBM Worklight
- Security with Go : explore the power of Golang to secure host, web, and cloud services
- Software test attacks to break mobile and embedded devices
- Wireless and mobile device security
- iOS application security : the definitive guide for hackers and developers
- iOS forensics cookbook : over 20 recipes that will enable you to handle and extract data from iOS devices for forensics
- iPhone forensics : recovering evidence, personal data, and corporate assets
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/AByMZnHGz7A/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/AByMZnHGz7A/">Mobile computing -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Mobile computing -- Security measures
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.mymcpl.org/resource/AByMZnHGz7A/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.mymcpl.org/resource/AByMZnHGz7A/">Mobile computing -- Security measures</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.mymcpl.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.mymcpl.org/">Mid-Continent Public Library</a></span></span></span></span></div>