1. Mobile data loss prevention. (2015) Authors: Raggo, Michael T Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Android application security : a semantics and context-aware approach /: a semantics and context-aware approach. (2016) Authors: Zhang, Mu; Yin, Heng Record Type: Book Extent: 1 online resource (105 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Mobile malware attacks and defense. (©2009) Other Names: Dunham, Ken; Abu-Nimeh, Saeed Record Type: Book Extent: 1 online resource (xxv, 409 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Citrix xenmobile mobile device management : gain an insight into the industry's best and most secure : enterprise mobility management solution /: gain an insight into the industry's best and most secure : enterprise mobility management solution. (2014) Other Names: Phoenix, Akash; Kumaravel, Seenivasan Record Type: Book Extent: 1 online resource (112 pages), illustrations (some color), tables View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Security of mobile communications. (©2010) Other Names: Boudriga, Noureddine Record Type: Book Extent: 1 online resource (xxxiii, 612 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Securing cloud and mobility : a practitioner's guide /: a practitioner's guide. (2013) Other Names: Lim, Ian; Hourani, Paul; Coolidge, E. Coleen Record Type: Book Extent: 1 online resource (xvii, 210 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. Instant XenMobile MDM : a guide to effectively equipping mobile devices with configuration, security, provisioning, and support capabilities using XenMobile, the world's most popular mobile management software /: a guide to effectively equipping mobile devices with configuration, security, provisioning, and support capabilities using XenMobile, the world's most popular mobile management software. (2013) Other Names: Lakhani, Aamir Record Type: Book Extent: 1 online resource (1 volume), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Mobile security : how to secure, privatize, and recover your devices : keep your data secure on the go /: how to secure, privatize, and recover your devices : keep your data secure on the go. (2013) Authors: Speed, Tim Other Names: Gajera, Amit cover designer. Record Type: Book Extent: 1 online resource (242 pages), illustrations, graphs View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Android security : attacks and defenses /: attacks and defenses. (2013) Authors: Dubey, Abhishek; Misra, Anmol Record Type: Book Extent: 1 online resource (xx, 249 pages), illustrations (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Software test attacks to break mobile and embedded devices. (2013) Authors: Hagar, Jon Duncan Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗