Books on the topic 'Mobile attacker'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 36 books for your research on the topic 'Mobile attacker.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
1980-, Clark Chris, and Thiel David V, eds. Mobile application security: Protect mobile applications and devices from Web 2.0 attacks. McGraw-Hill, 2010.
Find full textAgency, Medical Devices, and Great Britain. Department of Health., eds. Mobile, armchair, folding and bed-attached commodes: A comparative evaluation. MedicalDevices Agency, 1994.
Find full textLu, Zhou, Wenye Wang, and Cliff Wang. Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23288-1.
Full textKarppinen, Kaarina. Security measurement based on attack trees in a mobile ad hoc network environment. VTT Technical Research Centre of Finland, 2005.
Find full textSamoylyuk, Rostislav, Anton Grichanov, Irina Zolotova, Aleksey Starcev, Stanislav Gorelov, and Aleksey Frolov. The activities of the internal affairs bodies in the performance of operational and official tasks in special conditions of service. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/2160986.
Full textMobile Malware Attacks and Defense. Elsevier, 2009. http://dx.doi.org/10.1016/b978-1-59749-298-0.x0001-8.
Full textDunham, Ken. Mobile Malware Attacks and Defense. Elsevier Science & Technology Books, 2008.
Find full textStephens, Keri K. Early Mobile Use. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190625504.003.0002.
Full textKithome, Anthony. Managing Threats of Cyber-Attacks on Mobile Devices. GRIN Verlag GmbH, 2018.
Find full textAttack Resistant Mobile Agents for Intrusion Detection Systems. Storming Media, 2001.
Find full textHagar, Jon Duncan. Software Test Attacks to Break Mobile and Embedded Devices. Taylor & Francis Group, 2013.
Find full textHagar, Jon Duncan. Software Test Attacks to Break Mobile and Embedded Devices. Taylor & Francis Group, 2013.
Find full textHagar, Jon Duncan. Software Test Attacks to Break Mobile and Embedded Devices. Taylor & Francis Group, 2013.
Find full textHagar, Jon Duncan. Software Test Attacks to Break Mobile and Embedded Devices. Taylor & Francis Group, 2013.
Find full textHagar, Jon Duncan. Software Test Attacks to Break Mobile and Embedded Devices. Taylor & Francis Group, 2017.
Find full textSoftware Test Attacks To Break Mobile And Embedded Devices. Taylor & Francis Inc, 2013.
Find full textAmiri, Iraj Sadegh, Elahe Fazeldehkordi, and Oluwatobi Ayodeji Akanbi. Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET. Elsevier Science & Technology Books, 2015.
Find full textAmiri, Iraj Sadegh, Elahe Fazeldehkordi, and Oluwatobi Ayodeji Akanbi. Study of Black Hole Attack Solutions: On AODV Routing Protocol in MANET. Elsevier Science & Technology Books, 2015.
Find full textLu, Zhou, Cliff Wang, and Wenye Wang. Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer London, Limited, 2015.
Find full textLu, Zhou, Cliff Wang, and Wenye Wang. Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications. Springer International Publishing AG, 2015.
Find full textBean, Hamilton. Mobile Technology and the Transformation of Public Alert and Warning. ABC-CLIO, LLC, 2019. http://dx.doi.org/10.5040/9798400686443.
Full textMisra, Anmol, and Abhishek Dubey. Android Security: Attacks and Defenses. Taylor & Francis Group, 2013.
Find full textRuxton, Graeme D., William L. Allen, Thomas N. Sherratt, and Michael P. Speed. Advertising elusiveness. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199688678.003.0009.
Full textBronk, Chris. Cyber Threat. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400636455.
Full textMedia, Syngress, James Stanger, and Brian Bagnall. E-mail Virus Protection Handbook : Protect your E-mail from Viruses, Tojan Horses, and Mobile Code Attacks. Syngress, 2000.
Find full textSyngress. E-Mail Virus Protection Handbook: Protect Your e-Mail from Trojan Horses, Viruses, and Mobile Code Attacks. Elsevier Science & Technology Books, 2000.
Find full textEthical Hacker’s Penetration Testing Guide: Vulnerability Assessment and Attack Simulation on Web, Mobile, Network Services and Wireless Networks. BPB Publications, 2022.
Find full textNarayana, Dileep Keshava. Demonstration and Evaluation of Battery Exhaustion Attacks on Mobile Phones : Project/Dissertation: University of Greenwich, London, United Kingdom 2012. Independently Published, 2019.
Find full textGreaves, Ian, and Sir Keith Porter. Oxford Handbook of Pre-hospital Care. Oxford University Press, 2020. http://dx.doi.org/10.1093/med/9780198734949.001.0001.
Full textGabbott, Sarah, and Jan Zalasiewicz. Discarded. Oxford University PressOxford, 2025. https://doi.org/10.1093/oso/9780192869333.001.0001.
Full textSangmeister, Hartmut, and Heike Wagner, eds. Verantwortung und Engagement von Unternehmen in der Internationalen Zusammenarbeit. Nomos Verlagsgesellschaft mbH & Co. KG, 2021. http://dx.doi.org/10.5771/9783748912255.
Full textMoran, Terence P., and Eugene Secunda. Selling War to America. Praeger, 2007. http://dx.doi.org/10.5040/9798216012771.
Full text