Naperville Public Library
Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
Home
Best Sellers
Research a Topic
Download & Stream
Material Request
My Account
Search by:
Keyword
|
Title
|
Author
|
Subject
|
Genre
|
Call Number
|
Series
|
Author & Title
|
ISBN/ISSN
|
Format
|
Advanced
Your session will expire automatically in
0
seconds.
Continue session
End session now
Return to Browse
More Resources
SearchType
Keyword
Author
Title
Subject
Genre/Form
Call no.
Series title
Standard no.
Search
Search Scope
View Entire Collection
Adult Collection
Teen Collection
Juvenile Collection
Adult Virtual Collection
Juvenile Virtual Collection
Adult Fiction
Adult Nonfiction
Juvenile Fiction
Juvenile Easy Fiction
Juvenile Readers
Juvenile Nonfiction
Nichols Library
Naper Blvd Library
95th Street Library
Virtual Library
Nichols Adult Collection
Nichols Teen Collection
Nichols Juvenile Collection
Naper Blvd Adult Collection
Naper Blvd Teen Collection
Naper Blvd Juvenile Collection
95th Street Adult Collection
95th Street Teen Collection
95th Street Juvenile Collection
Limit search to available items
Add All On Page to My List
Subjects (1-30 of 30)
Mobile computing -- Security measures.
1
2014
10 don'ts on your digital devices : the non-techie's survival guide to cyber security and privacy
Bachrach, Daniel G., author.
Berkeley, CA : Apress, [2014]
available online
Save to My List
Full Record
More Resources
894509205
2
2005
AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
Nakhjiri, Madjid.
Chichester, England ; Hoboken, NJ : John Wiley & Sons, ©2005.
available online
Save to My List
Full Record
More Resources
62348705
3
2011
Android forensics : investigation, analysis, and mobile security for Google Android
Hoog, Andrew.
Waltham, MA : Syngress, ©2011.
available online
Save to My List
Full Record
More Resources
751987663
4
2014
Android malware and analysis
Dunham, Ken.
Boca Raton : CRC Press, Taylor & Francis Group, [2014]
available online
Save to My List
Full Record
More Resources
893735799
5
2024
The Android malware handbook : manual analysis and ML-based detection
Han, Qian (Research scientist), author.
San Francisco : No Starch Press, [2024]
available online
Save to My List
Full Record
More Resources
6
2013
Android security : attacks and defenses
Dubey, Abhishek (Information security)
Boca Raton, FL : CRC Press, ©2013.
available online
Save to My List
Full Record
More Resources
895913691
7
2011
Application security for the Android platform
Six, Jeff.
Sebastopol, CA : O'Reilly, 2011, ©2012.
available online
Save to My List
Full Record
More Resources
781716290
8
2015
Extending IBM business process manager to the mobile enterprise with IBM worklight
Abdel-Hamid, Ahmed, author.
Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2015.
available online
Save to My List
Full Record
More Resources
904769588
9
2016
Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it
Kotipalli, Srinivasa Rao, author.
Birmingham, UK : Packt Publishing, 2016.
available online
Save to My List
Full Record
More Resources
957298786
10
2013
Hacking exposed : mobile security secrets & solutions
Bergman, Neil.
New York : McGraw-Hill, [2013]
available online
Save to My List
Full Record
More Resources
864714007
11
2023
Intelligent mobile malware detection
Thomas, Tony, author.
Boca Raton, FL : CRC Press, 2023.
available online
Save to My List
Full Record
More Resources
12
2016
IOS application security : the definitive guide for hackers and developers
Thiel, David, 1980- author.
San Francisco, CA : No Starch Press, [2016]
available online
Save to My List
Full Record
More Resources
944248696
13
2022
IOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting,
Tiepolo, Gianluca, author.
[Place of publication not identified] : Packt Publishing, 2022.
available online
Save to My List
Full Record
More Resources
14
2022
IOS Forensics for Investigators : Take Mobile Forensics to the Next Level by Analyzing, Extracting,
Tiepolo, Gianluca.
Birmingham : Packt Publishing, Limited, 2022.
available online
Save to My List
Full Record
More Resources
15
2008
IPhone forensics : recovering evidence, personal data, and corporate assets
Zdziarski, Jonathan A.
Sebastopol, Calif. : O'Reilly Media, 2008.
available online
Save to My List
Full Record
More Resources
297556550
16
2018
Learning Android forensics : analyze Android devices with the latest forensic tools and techniques
Skulkin, Oleg, author.
Birmingham, UK : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
17
2010
Mobile application security
Dwivedi, Himanshu.
New York : McGraw-Hill, ©2010.
available online
Save to My List
Full Record
More Resources
593356387
18
2009
Mobile malware attacks and defense
Burlington, MA : Syngress Pub., ©2009.
available online
Save to My List
Full Record
More Resources
793291729
19
2009
Mobile Security : a Pocket Guide.
Furnell, Steven.
Ely : IT Governance Pub., 2009.
available online
Save to My List
Full Record
More Resources
609854809
20
2017
Mobile security and privacy : advances, challenges and future research directions
Cambridge, MA : Syngress, [2017]
available online
Save to My List
Full Record
More Resources
960211654
21
2014
Netzsicherheit : Grundlagen & Protokolle - Mobile & drahtlose Kommunikation - Schutz von Kommunikati
Schäfer, Günter.
Heidelberg : Dpunkt.verlag, 2014.
available online
Save to My List
Full Record
More Resources
888745394
22
2016
Practical mobile forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, an
Mahalik, Heather, author.
Birmingham, UK : Packt Publishing, 2016.
available online
Save to My List
Full Record
More Resources
951424972
23
2018
Practical mobile forensics : a hands-on guide to mastering mobile forensics for the iOS, Android, an
Tamma, Rohit, author.
Birmingham, UK : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
24
2018
Pro iOS security and forensics : enterprise iPhone and iPad safety
Thiel, David, 1980- author.
[Place of publication not identified] : Apress [2018]
available online
Save to My List
Full Record
More Resources
25
2014
Secure development for mobile apps : how to design and code secure mobile applications with PHP and
Glaser, J. D.
Boca Raton : Auerbach Publications, 2014.
available online
Save to My List
Full Record
More Resources
894538138
26
2013
Securing cloud and mobility : a practitioner's guide
Lim, Ian, author.
Boca, Raton : CRC Press/Taylor & Francis, [2013]
available online
Save to My List
Full Record
More Resources
27
2013
Securing your mobile business with IBM Worklight
Poughkeepsie, NY : IBM Corp., International Technical Support Organization, 2013.
available online
Save to My List
Full Record
More Resources
870674362
28
2018
Security with Go : explore the power of Golang to secure host, web, and cloud services
Leon, John Daniel, author.
Birmingham, UK : Packt Publishing, 2018.
available online
Save to My List
Full Record
More Resources
29
2014
Software test attacks to break mobile and embedded devices
Hagar, Jon Duncan, author.
Boca Raton, FL : CRC Press, [2014]
available online
Save to My List
Full Record
More Resources
862109669
30
2022
Take control of iOS & iPadOS privacy and security
Fleishman, Glenn, author.
[Place of publication not identified] : Take Control Books, [2022]
available online
Save to My List
Full Record
More Resources
locate in results
More Information
Find another book like this
Mobile communication systems -- Security measures
at
Novelist
Return to Browse
Search: