Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Modify Search
(Search History)
Keyword: Mobile communication systems -- Security measures in View Entire Collection
(Clear Search History)
(End Search Session)
Search history function requires JavaScript.
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
40 results found.
Sorted by
relevance
|
date
|
title
.
Add All On Page to My List
Keywords (1-40 of 40)
very relevant titles
entries 1-11
1
2023
Intelligent mobile malware detection
Thomas, Tony, author.
Boca Raton, FL : CRC Press, 2023.
available online
Save to My List
Full Record
More Resources
2
2018
Security with Go : explore the power of Golang to secure host, web, and cloud services
Leon, John Daniel, author.
Birmingham, UK : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
3
2018
Wireless Network Security : Second Edition
Osterhage, Wolfgang, author. University of Frankfurt, Frankfurt am Main, Germany
CRC Press, 2018.
available online
Save to My List
Full Record
More Resources
4
2018
Comprehensive guide to 5G security
Hoboken, NJ : John Wiley & Sons, 2018.
available online
Save to My List
Full Record
More Resources
5
2014
Secure development for mobile apps : how to design and code secure mobile applications with PHP and
Glaser, J. D.
Boca Raton : Auerbach Publications, 2014.
available online
Save to My List
Full Record
More Resources
894538138
6
2013
Hacking exposed : mobile security secrets & solutions
Bergman, Neil.
New York : McGraw-Hill, [2013]
available online
Save to My List
Full Record
More Resources
864714007
7
2011
Mobile device security for dummies
Campagna, Rich R.
Indianapolis, Ind. : Wiley Pub., 2011.
available online
Save to My List
Full Record
More Resources
774283985
8
2011
Wireless security
Osterhage, Wolfgang.
Boca Raton, Fla. : CRC Press, 2011.
available online
Save to My List
Full Record
More Resources
794216742
9
2010
Mobile application security
Dwivedi, Himanshu.
New York : McGraw-Hill, ©2010.
available online
Save to My List
Full Record
More Resources
593356387
10
2009
Wireless security
Burlington, MA : Newnes, ©2009.
available online
Save to My List
Full Record
More Resources
824144647
11
2009
Mobile malware attacks and defense
Burlington, MA : Syngress Pub., ©2009.
available online
Save to My List
Full Record
More Resources
793291729
other relevant titles
entries 12-40
12
2023
CompTIA A+ practice test Core 2 (220-1102) : achieve certification by practicing with hundreds of mo
Birch, Mark, author.
Birmingham, UK : Packt Publishing Ltd., 2023.
available online
Save to My List
Full Record
More Resources
13
2022
COMPUTATIONAL INTELLIGENT SECURITY IN WIRELESS COMMUNICATIONS
[S.l.] : CRC PRESS, 2022.
available online
Save to My List
Full Record
More Resources
14
2021
(ISC)2 CISSP certified information systems security professional official study guide
Chapple, Mike, author.
Hoboken, New Jersey : John Wiley and Sons, Inc., [2021]
available online
Save to My List
Full Record
More Resources
15
2021
Principles of computer security : CompTIA Security+ and beyond, (exam SY0-501)
Conklin, Wm. Arthur (William Arthur), author.
New York : McGraw-Hill, 2021.
available online
Save to My List
Full Record
More Resources
16
2021
SECURITY IN IOT the changing perspective.
CHAKI, RITUPARNA. ROY, DEBDUTTA BARMAN.
[S.l.] : CRC PRESS, 2021.
available online
Save to My List
Full Record
More Resources
17
2020
Internet of Things : integration and security challenges
Boca Raton : CRC Press, 2020.
available online
Save to My List
Full Record
More Resources
18
2019
Cybersecurity Blue Team toolkit
Tanner, Nadean H., author.
Indianapolis, IN : Wiley, [2019]
Location
Call No.
Status
95th Street Adult Nonfiction
005.8 TAN 2019
AVAILABLE
Save to My List
Full Record
Place a hold
More Resources
19
2019
Cybersecurity blue team toolkit
Tanner, Nadean H., author.
Indianapolis, IN : Wiley, [2019]
available online
Save to My List
Full Record
More Resources
20
2017
Handbook of system safety and security : cyber risk and risk management, cyber security, threat anal
Cambridge, MA : Syngress is an imprint of Elsevier, [2017]
available online
Save to My List
Full Record
More Resources
960041270
21
2016
Hacking for dummies
Beaver, Kevin, author.
Hoboken, NJ : John Wiley & Sons, Inc., [2016]
available online
Save to My List
Full Record
More Resources
933291620
22
2016
Wireless communications security : solutions for the internet of things
Penttinen, Jyrki T. J., author.
Chichester, West Sussex, United Kingdom : John Wiley & Sons, [2017]
available online
Save to My List
Full Record
More Resources
960210757
23
2015
Learning AirWatch : learn to implement, manage, and deploy the latest Enterprise Mobility Management
Dunkerley, Mark, author.
Birmingham, UK : Packt Publishing, 2015.
available online
Save to My List
Full Record
More Resources
908029929
24
2015
Enterprise cybersecurity : how to build a successful cyberdefense program against advanced threats
Donaldson, Scott E., author.
[Berkeley, CA] : Apress, [2015]
available online
Save to My List
Full Record
More Resources
910159354
25
2014
Netzsicherheit : Grundlagen & Protokolle - Mobile & drahtlose Kommunikation - Schutz von Kommunikati
Schäfer, Günter.
Heidelberg : Dpunkt.verlag, 2014.
available online
Save to My List
Full Record
More Resources
888745394
26
2014
Physical layer security in wireless communications
Boca Raton, FL : CRC Press, Taylor & Francis Group, [2014]
available online
Save to My List
Full Record
More Resources
862978293
27
2014
Intrusion detection in wireless ad-hoc networks
Boca Raton, FL : CRC Press, [2014]
available online
Save to My List
Full Record
More Resources
866438987
28
2014
Security for multihop wireless networks
Boca Raton : CRC Press, Taylor & Francis Group, [2014]
available online
Save to My List
Full Record
More Resources
875096062
29
2014
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
Bachrach, Daniel G., author.
Berkeley, CA : Apress, [2014]
available online
Save to My List
Full Record
More Resources
894509205
30
2013
Emerging trends in ICT security
Waltham, Massachusetts : Morgan Kaufmann/Elsevier, [2013]
available online
Save to My List
Full Record
More Resources
863453607
31
2013
Introduction to computer networks and cybersecurity
Wu, Chwan-Hwa, author.
Boca Raton, FL : CRC Press, [2013]
available online
Save to My List
Full Record
More Resources
899501242
32
2012
Handbook on securing cyber-physical critical infrastructure : foundation and challenges
Waltham, MA : Morgan Kaufmann, ©2012.
available online
Save to My List
Full Record
More Resources
806221433
33
2012
Communication System Security
Gong, Lidong Chen. Guang.
[Place of publication not identified] : Chapman and Hall/CRC, 2012.
available online
Save to My List
Full Record
More Resources
900313304
34
2011
Android forensics : investigation, analysis, and mobile security for Google Android
Hoog, Andrew.
Waltham, MA : Syngress, ©2011.
available online
Save to My List
Full Record
More Resources
751987663
35
2011
CompTIA security+ deluxe study guide
Dulaney, Emmett A.
Indianapolis, Ind. : Wiley Pub., ©2011.
available online
Save to My List
Full Record
More Resources
781718586
36
2011
A multidisciplinary introduction to information security
[Place of publication not identified] : Chapman and Hall/CRC, 2011.
available online
Save to My List
Full Record
More Resources
991528211
37
2009
Mobile Security : a Pocket Guide.
Furnell, Steven.
Ely : IT Governance Pub., 2009.
available online
Save to My List
Full Record
More Resources
609854809
38
2008
IPhone forensics : recovering evidence, personal data, and corporate assets
Zdziarski, Jonathan A.
Sebastopol, Calif. : O'Reilly Media, 2008.
available online
Save to My List
Full Record
More Resources
297556550
39
2005
Bulletproof wireless security : GSM, UMTS, 802.11 and ad hoc security
Chandra, Praphul.
Burlington, MA : Newnes, ©2005.
available online
Save to My List
Full Record
More Resources
824885364
40
2003
Wireless hacks
Flickenger, Rob.
Sebastopol, CA : O'Reilly, ©2003.
available online
Save to My List
Full Record
More Resources
649949090
More Information
Find another book like this
Mobile communication systems -- Security measures
at
Novelist
Modify Search
(Search History)
Keyword: Mobile communication systems -- Security measures in View Entire Collection
(Clear Search History)
(End Search Session)
Search: