Your search returned 7 results.

|
1.
Security management in mobile cloud computing / Kashif Munir, editor.

by Munir, Kashif, 1976- [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.585 .S444 2017.
2.
Detecting and mitigating robotic cyber security risks / Raghavendra Kumar, Prasant Kumar Pattnaik and Priyanka Pandey [editors].

by Kumar, Raghavendra [editor.] | Pattnaik, Prasant Kumar [editor.] | Pandey, Priyanka [editor.] | IGI Global [publisher.].

Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, PA 17033, USA) : IGI Global, [2017]Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: TK5105.59 .D48 2017.
3.
Android Malware and Analysis.

by Dunham, Ken | Hartman, Shane | Quintans, Manu | Morales, Jose Andre | Strazzere, Tim.

Material type: Text Text; Format: electronic available online remote Publisher: Philadelphia, PA : CRC Press, 2014Online access: Click here to view this ebook. Availability: No items available :
4.
Secure Development for Mobile Apps : How to Design and Code Secure Mobile Applications with PHP and JavaScript

by Glaser, J. D.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2014Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 .G384 2014.
5.
Software Test Attacks to Break Mobile and Embedded Devices.

by Hagar, Jon Duncan.

Material type: Text Text; Format: electronic available online remote Publisher: Hoboken : Taylor and Francis, 2013Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 H343 2013.
6.
Mobile Security : a Pocket Guide.

by Furnell, Steven.

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Ely : IT Governance Pub., 2009Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.59 .F87 2009.
7.
Information security theory and practices : smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings / Damien Sauveron ... [et al.] (eds.).

by WISTP 2007 (2007 : Hērakleion, Greece) | Sauveron, Damien | International Federation for Information Processing. Technical Committee 6 | IFIP WG 8.8 (Smart Cards).

Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; New York : Springer, c2007Other title: First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | 1st IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007 | WISTP 2007.Online access: Click here to view this ebook. Availability: Items available for loan: UT Tyler Online (1). Location(s): Online Call number: QA76.9.A25 W59 2007.