Mobile security

Results: 2765



#Item
41

Challenges in Security and Privacy for Mobile Edge-Clouds Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan CMU-PDLOct 2013

Add to Reading List

Source URL: www.pdl.cmu.edu

- Date: 2014-04-03 14:00:51
    42

    Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

    Add to Reading List

    Source URL: www.incose-cc.org

    - Date: 2015-10-31 23:19:08
      43

      TREND MICRO™ Mobile Security 5.0 for iOS - Product Guide V1.0 Trend Micro, Incorporated—US Headquarters

      Add to Reading List

      Source URL: solutionfile.trendmicro.com

      - Date: 2016-09-13 16:18:39
        44

        UBICOMM 2014 : The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies Event Driven Adaptive Security in Internet of Things Waqas Aman and Einar Snekkenes Norwegian Informa

        Add to Reading List

        Source URL: www.researchgate.net

          45

          PRODUKTINFORMATION G DATA MOBILE INTERNET SECURITY SORGENFREI UNTERWEGS MIT ANDROID®-SMARTPHONE ODER -TABLET

          Add to Reading List

          Source URL: file.gdatasoftware.com

          - Date: 2016-09-09 02:17:29
            46

            PRODUKTINFORMATION G DATA MOBILE INTERNET SECURITY SORGENFREI UNTERWEGS MIT iPHONE ODER iPAD

            Add to Reading List

            Source URL: file.gdatasoftware.com

            - Date: 2016-08-03 04:45:53
              47

              Press Release Mobile Enablement Introduces Significant Security Threats to Enterprise IT, According to VDC Research Due to varied enterprise needs, a “one size fits all” solution to address mobile security remains el

              Add to Reading List

              Source URL: www.vdcresearch.com

              - Date: 2016-02-01 13:56:03
                48

                Open Mobile API for OEMs: Enriches Mobile Platforms by Promoting Interoperability and the Highest Levels of Security for Connected Devices The emergence of smartphones and tablets

                Add to Reading List

                Source URL: simalliance.org

                - Date: 2016-01-26 04:46:29
                  49

                  PROPOSED POLICY P02Mobile Device Security Policy University employees and students who use a laptop computer or mobile device (e.g. portable hard drives, USB flash drives, smartphones, tablets) are responsibl

                  Add to Reading List

                  Source URL: alaska.edu

                  - Date: 2015-02-18 18:41:14
                    50

                    Bright House Networks Home Security and Automation Mobile Application Quick Start Guide

                    Add to Reading List

                    Source URL: brighthouse.com

                    - Date: 2016-08-26 00:46:43
                      UPDATE