Your search returned 7 results. Subscribe to this search

|
1. Security management in mobile cloud computing / Kashif Munir, editor.

by Munir, Kashif, 1976- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.585 .S444 2017.
2. Detecting and mitigating robotic cyber security risks / Raghavendra Kumar, Prasant Kumar Pattnaik and Priyanka Pandey [editors].

by Kumar, Raghavendra [editor.] | Pattnaik, Prasant Kumar [editor.] | Pandey, Priyanka [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online TK5105.59 .D48 2017.
3. Android Malware and Analysis.

by Dunham, Ken | Hartman, Shane | Quintans, Manu | Morales, Jose Andre | Strazzere, Tim.

Material type: Text Text; Format: electronic available online remote Publisher: Philadelphia, PA : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available
4. Secure Development for Mobile Apps : How to Design and Code Secure Mobile Applications with PHP and JavaScript

by Glaser, J. D.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 .G384 2014.
5. Software Test Attacks to Break Mobile and Embedded Devices.

by Hagar, Jon Duncan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 H343 2013.
6. Mobile Security : a Pocket Guide.

by Furnell, Steven.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Pub., 2009Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.59 .F87 2009.
7. Information security theory and practices : smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings / Damien Sauveron ... [et al.] (eds.).

by WISTP 2007 (2007 : Hērakleion, Greece) | Sauveron, Damien | International Federation for Information Processing. Technical Committee 6 | IFIP WG 8.8 (Smart Cards).

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | 1st IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | WISTP 2007.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online QA76.9.A25 W59 2007.