To see the other types of publications on this topic, follow the link: Smartphone Protection.

Books on the topic 'Smartphone Protection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 32 books for your research on the topic 'Smartphone Protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Loyola, Paulo Henrique. Como a obsolescência programada viola dirieitos fundamentais do consumidor: O caso do iPhone 4. Letramento, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Churchill, Robert Paul. Providing Protection and Leveraged Reform. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190468569.003.0007.

Full text
Abstract:
This is the first of three chapters on protecting girls and women at risk and bringing about the end of honor killing. These short-term, emergency measures are understood as occurring while other efforts are made to achieve the long-term abolition of honor killing. Also examined are possibilities for leveraging change; that is, changing behaviors through pressures from outside honor–shame communities and through pressures that are coercive. Emergency interventions discussed include those tested elsewhere as well as new initiatives. Insofar as possible, trusted members of local communities should administer emergency interventions. Interventions include hotlines, smartphone apps, information networks, mobile crisis teams, observer-informants, shelters, halfway houses, family centers, granting asylum, and others. The objective of leveraged change, primarily initiated by outside change agents, is to make continuing honor killings too costly. Recommended leveraging strategies include legal reforms, moral entrepreneurship, initiative by media and national elites, and decreasing learned and socialized aggression.
APA, Harvard, Vancouver, ISO, and other styles
3

Edition, Internet. Password Book: 100 Pages - Secret Codes - Identifiers - Email Box - Internet - Websites - Blogs - Social Networks - Smartphone - Phone - Pc - Personal Data Protection - Computer - Personal - Professional - Notebook - Logbook - Booklet. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Edition, Internet. Password Book: 100 Pages - Secret Codes - Identifiers - Email Box - Internet - Websites - Blogs - Social Networks - Smartphone - Phone - Pc - Personal Data Protection - Computer - Personal - Professional - Notebook - Logbook - Booklet - Must Have. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Edition, Internet. Password Book: 100 Pages - Secret Codes - Identifiers - Email Box - Internet - Websites - Blogs - Social Networks - Smartphone - Phone - Pc - Personal Data Protection - Computer - Personal - Professional - Notebook - Logbook - Booklet - Soft Cover. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Edition, Internet. Password Book: 100 Pages - Secret Codes - Identifiers - Email Box - Internet - Websites - Blogs - Social Networks - Smartphone - Phone - Pc - Personal Data Protection - Computer - Personal - Professional - Notebook - Logbook - Booklet - Men and Women. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Edition, Internet Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - Internet - Sites Web - Blogs - Réseaux Sociaux - Smartphone - Ordinateur - Téléphone - Pc - Protection des Données Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Edition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Boite Email - Internet - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Edition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - Internet - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique - Confidentiel - Personnel. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Edition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Boite Email - Internet - Web - Sites - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Pro. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Edition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Boite Email - Confidentiel - Site Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mobile Devices: Privacy Risks and Protections. Nova Science Pub Inc, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Edition, Internet. Carnet de Mots de Passe: Format de Poche - Codes Secrets - Identifiants - Boite Email - Internet - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Pro. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Edition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Boite Email - Confidentiel - Site Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Pro - Discret. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Edition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - de Poche - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Edition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - S�curit� - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Confidentielit� - Personnel - Pro. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Edition, Internet. Carnet de Mots de Passe: 100 Pages - Codes Secrets - Identifiants - Adresses Email - S�curit� - Sites Web - Blogs - R�seaux Sociaux - Smartphone - Ordinateur - T�l�phone - Pc - Protection des Donn�es Personnelles - Informatique- Personnel - Professionnel. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Zhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yerukhimovich, Arkady, Rebecca Balebako, Anne Boustead, et al. Can Smartphones and Privacy Coexist? Assessing Technologies and Regulations Protecting Personal Data on Android and iOS Devices. RAND Corporation, 2016. http://dx.doi.org/10.7249/rr1393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Protecting Mobile Networks and Devices: Challenges and Solutions. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Zhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices: Challenges and Solutions. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Zhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices: Challenges and Solutions. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Zhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices: Challenges and Solutions. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Zhou, Jianying, Steven Furnell, Weizhi Meng, and Xiapu Luo. Protecting Mobile Networks and Devices: Challenges and Solutions. Auerbach Publishers, Incorporated, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Alexander, Philip. Home and Small Business Guide to Protecting Your Computer Network, Electronic Assets, and Privacy. Greenwood Publishing Group, Inc., 2009. http://dx.doi.org/10.5040/9798400666087.

Full text
Abstract:
In the news on a daily basis are reports of lost or stolen computer data, hacker successes, identity thefts, virus and spyware problems, and network incursions of various kinds. Many people, especially nonprofessional administrators of home or small business networks, feel helpless. In this book, technical security expert Philip Alexander explains in layman's terms how to keep networks and individual computers safe from the bad guys. In presenting solutions to these problems and many others, the book is a lifeline to those who know their computer systems are vulnerable to smart thieves and hackers—not to mention tech-savvy kids or employees who are swapping music files, stealing software, or otherwise making a mockery of the word security. In his job protecting data and combating financial fraud, Philip Alexander knows well which power tools are required to keep hackers and thieves at bay. With his gift for putting technical solutions in everyday language, Alexander helps readers with home and/or small business networks protect their data, their identities, and their privacy using the latest techniques. In addition, readers will learn how to protect PDAs and smartphones, how to make hardware thefts more unlikely, how to sniff out scammers and the motives of offshore tech support personnel who ask too many questions, and how to keep personal information safer when shopping over the Internet or telephone.
APA, Harvard, Vancouver, ISO, and other styles
26

BEDDIAR, Nadia, ed. Les jeunes face au numérique. Editions des archives contemporaines, 2022. http://dx.doi.org/10.17184/eac.9782813004604.

Full text
Abstract:
Entre information, communication, divertissements et conditionnements, l’exposition aux écrans semblent produire une influence sur le développement des enfants et des adolescents. Mais, plus que l’exposition, facilitée par la démocratisation des technologies numériques et la diversification des supports (tablettes, smartphones, ordinateurs, montres...), c’est bien la question des usages des outils numériques qui se pose avec acuité et qui interrogent le rôle des parents et de la famille et plus largement, celui des institutions telles que l’école. Si Internet offre de nouvelles opportunités en matière d’apprentissage aux enfants et aux adolescents, il pose aussi la question de leur protection. Des chercheurs issus de multiples disciplines comme la psychologie clinique, la sociologie et le droit partagent ici leurs éclairages et les résultats de leurs recherches pour offrir une meilleure compréhension de ces phénomènes, en offrant un espace de réflexion sur les enjeux et les problématiques issues de la transition numérique à l’égard des plus jeunes.
APA, Harvard, Vancouver, ISO, and other styles
27

Protecting mobile privacy: Your smartphones, tablets, cell phones and your privacy : hearing before the Subcommittee on Privacy, Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, May 10, 2011. U.S. Government Printing Office, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Kerr, Orin. The Digital Fourth Amendment. Oxford University PressNew York, NY, 2024. http://dx.doi.org/10.1093/9780190627102.001.0001.

Full text
Abstract:
Abstract When can the government read your email or monitor your web surfing? When can the police search your phone or copy your computer files? In the United States, the answers come from the Fourth Amendment to the Constitution and its ban on “unreasonable searches and seizures.” The Digital Fourth Amendment: Privacy and Policing in Our Online World takes the reader inside the legal world of how courts are interpreting the Fourth Amendment in the digital age. Computers, smartphones, and the Internet have transformed criminal investigations, and even a routine crime is likely to lead to digital evidence. But courts are struggling to apply old Fourth Amendment concepts to the new digital world. Mechanically applying old rules from physical investigations doesn’t make sense, often leading to dramatic expansions of government power based only on coincidences of computer design. Written by a prominent law professor whose scholarship has often been relied on by courts in the field, The Digital Fourth Amendment shows how judges must craft new rules for the new world of digital evidence. It explains the challenges courts confront as they translate old protections to a new technological world, bringing the reader up to date on the latest cases and rulings. Informed by legal history and the latest technology, this book gives courts a blueprint for legal change with clear rules for courts to adopt to restore our constitutional rights in the computer age.
APA, Harvard, Vancouver, ISO, and other styles
29

Jakobsson, Markus. Death of the Internet. Wiley & Sons, Limited, John, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Jakobsson, Markus. Death of the Internet. IEEE Computer Society Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Jakobsson, Markus. Death of the Internet. IEEE Computer Society Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jakobsson, Markus. Death of the Internet. IEEE Computer Society Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography