Search Results for Mobile computing -- Security measures. - Narrowed by: 1:IIEMSASirsiDynix Enterprisehttps://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dMobile$002bcomputing$002b--$002bSecurity$002bmeasures.$0026qf$003dLIBRARY$002509Library$0025091$00253AIIEMSA$0025091$00253AIIEMSA$0026ps$003d300?2025-06-15T19:50:39ZAndroid security : attacks and defensesent://SD_ILS/0/SD_ILS:502242025-06-15T19:50:39Z2025-06-15T19:50:39Zby Misra, Anmol.<br/>Format: Books<br/>Publication Date 2013<br/>Hacking exposed : mobile security secrets &amp; solutionsent://SD_ILS/0/SD_ILS:505112025-06-15T19:50:39Z2025-06-15T19:50:39Zby Bergman, Neil.<br/>Format: Books<br/>Publication Date 2013<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:507122025-06-15T19:50:39Z2025-06-15T19:50:39Zby Hoog, Andrew.<br/>Format: Books<br/>Publication Date 2011<br/>Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chileent://SD_ILS/0/SD_ILS:338162025-06-15T19:50:39Z2025-06-15T19:50:39Zby IFIP TC6/WG6.2, 6.6, 6.7, and 6.8 International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Format: Books<br/>Publication Date 2006<br/>