Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
 More Resources
     
Limit search to available items
Add All On Page to My List
Subjects (1-30 of 30)
Mobile computing -- Security measures.
2
EBOOK
2005
AAA and network security for mobile access : radius, diameter, EAP, PKI and IP mobility
Nakhjiri, Madjid.
Chichester, England ; Hoboken, NJ : John Wiley & Sons, ©2005.
Click for more information
No one has rated this material
4
EBOOK
2014
Android malware and analysis
Dunham, Ken.
Boca Raton : CRC Press, Taylor & Francis Group, [2014]
Click for more information
No one has rated this material
5
EBOOK
2024
The Android malware handbook : manual analysis and ML-based detection
Han, Qian (Research scientist), author.
San Francisco : No Starch Press, [2024]
Click for more information
No one has rated this material
6
EBOOK
2013
Android security : attacks and defenses
Dubey, Abhishek (Information security)
Boca Raton, FL : CRC Press, ©2013.
Click for more information
No one has rated this material
7
EBOOK
2011
Click for more information
No one has rated this material
8
EBOOK
2015
Extending IBM business process manager to the mobile enterprise with IBM worklight
Abdel-Hamid, Ahmed, author.
Poughkeepsie, NY : IBM Corporation, International Technical Support Organization, 2015.
Click for more information
No one has rated this material
9
EBOOK
2016
Click for more information
No one has rated this material
10
EBOOK
2013
Click for more information
No one has rated this material
11
EBOOK
2023
Intelligent mobile malware detection
Thomas, Tony, author.
Boca Raton, FL : CRC Press, 2023.
Click for more information
No one has rated this material
12
EBOOK
2016
IOS application security : the definitive guide for hackers and developers
Thiel, David, 1980- author.
San Francisco, CA : No Starch Press, [2016]
Click for more information
No one has rated this material
13
EAUDIOBOOK
2022
IOS forensics for investigators : take mobile forensics to the next level by analyzing, extracting,
Tiepolo, Gianluca, author.
[Place of publication not identified] : Packt Publishing, 2022.
Click for more information
No one has rated this material
15
EBOOK
2008
Click for more information
No one has rated this material
17
EBOOK
2010
Mobile application security
Dwivedi, Himanshu.
New York : McGraw-Hill, ©2010.
Click for more information
No one has rated this material
18
EBOOK
2009
Click for more information
No one has rated this material
19
EBOOK
2009
Mobile Security : a Pocket Guide.
Furnell, Steven.
Ely : IT Governance Pub., 2009.
Click for more information
No one has rated this material
24
EBOOK
2018
Pro iOS security and forensics : enterprise iPhone and iPad safety
Thiel, David, 1980- author.
[Place of publication not identified] : Apress [2018]
No one has rated this material
26
EBOOK
2013
Securing cloud and mobility : a practitioner's guide
Lim, Ian, author.
Boca, Raton : CRC Press/Taylor & Francis, [2013]
Click for more information
No one has rated this material
27
EBOOK
2013
Securing your mobile business with IBM Worklight

Poughkeepsie, NY : IBM Corp., International Technical Support Organization, 2013.
Click for more information
No one has rated this material
29
EBOOK
2014
Software test attacks to break mobile and embedded devices
Hagar, Jon Duncan, author.
Boca Raton, FL : CRC Press, [2014]
Click for more information
No one has rated this material
30
EBOOK
2022
Take control of iOS & iPadOS privacy and security
Fleishman, Glenn, author.
[Place of publication not identified] : Take Control Books, [2022]
Click for more information
No one has rated this material
locate in results
More Information
Find another book like this Mobile communication systems -- Security measures at Novelist