Books on the topic 'Smartphone Protection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 books for your research on the topic 'Smartphone Protection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Loyola, Paulo Henrique. Como a obsolescência programada viola dirieitos fundamentais do consumidor: O caso do iPhone 4. Letramento, 2021.
Find full textChurchill, Robert Paul. Providing Protection and Leveraged Reform. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190468569.003.0007.
Full textEdition, Internet. Password Book: 100 Pages - Secret Codes - Identifiers - Email Box - Internet - Websites - Blogs - Social Networks - Smartphone - Phone - Pc - Personal Data Protection - Computer - Personal - Professional - Notebook - Logbook - Booklet. Independently Published, 2019.
Find full textEdition, Internet. Password Book: 100 Pages - Secret Codes - Identifiers - Email Box - Internet - Websites - Blogs - Social Networks - Smartphone - Phone - Pc - Personal Data Protection - Computer - Personal - Professional - Notebook - Logbook - Booklet - Must Have. Independently Published, 2019.
Find full textEdition, Internet. Password Book: 100 Pages - Secret Codes - Identifiers - Email Box - Internet - Websites - Blogs - Social Networks - Smartphone - Phone - Pc - Personal Data Protection - Computer - Personal - Professional - Notebook - Logbook - Booklet - Soft Cover. Independently Published, 2019.
Find full textEdition, Internet. Password Book: 100 Pages - Secret Codes - Identifiers - Email Box - Internet - Websites - Blogs - Social Networks - Smartphone - Phone - Pc - Personal Data Protection - Computer - Personal - Professional - Notebook - Logbook - Booklet - Men and Women. Independently Published, 2019.
Find full textEdition, Internet Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - Internet - Sites Web - Blogs - Réseaux Sociaux - Smartphone - Ordinateur - Téléphone - Pc - Protection des Données Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Boite Email - Internet - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - Internet - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique - Confidentiel - Personnel. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Boite Email - Internet - Web - Sites - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Pro. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Boite Email - Confidentiel - Site Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: Format de Poche - Codes Secrets - Identifiants - Boite Email - Internet - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Pro. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Boite Email - Confidentiel - Site Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Pro - Discret. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - de Poche - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - S�curit� - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Confidentielit� - Personnel - Pro. Independently Published, 2019.
Find full textEdition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - S�curit� - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.
Find full textZhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices. Taylor & Francis Group, 2020.
Find full textYerukhimovich, Arkady, Rebecca Balebako, Anne Boustead, et al. Can Smartphones and Privacy Coexist? Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices. RAND Corporation, 2016. http://dx.doi.org/10.7249/rr1393.
Full textProtecting Mobile Networks and Devices: Challenges and Solutions. Taylor & Francis Group, 2016.
Find full textZhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices: Challenges and Solutions. Auerbach Publishers, Incorporated, 2016.
Find full textZhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices: Challenges and Solutions. Auerbach Publishers, Incorporated, 2016.
Find full textZhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices: Challenges and Solutions. Auerbach Publishers, Incorporated, 2016.
Find full textZhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices: Challenges and Solutions. Auerbach Publishers, Incorporated, 2016.
Find full textAlexander, Philip. Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400666087.
Full textBEDDIAR, Nadia, ed. Les jeunes face au numérique. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.9782813004604.
Full textProtecting mobile privacy: Your smartphones, tablets, cell phones and your privacy : hearing before the Subcommittee on Privacy, Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, May 10, 2011. U.S. Government Printing Office, 2011.
Find full textKerr, Orin. The Digital Fourth Amendment. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780190627102.001.0001.
Full text