Mobile security

Results: 2765



#Item
101報道関係各位 2009 年 4 月 27 日 株式会社 VASCO Data Security Japan VASCO の 認証ソリューション DIGIPASS for Mobile が NTT ドコモの i モードで利用可能に

報道関係各位 2009 年 4 月 27 日 株式会社 VASCO Data Security Japan VASCO の 認証ソリューション DIGIPASS for Mobile が NTT ドコモの i モードで利用可能に

Add to Reading List

Source URL: www.vasco.co.jp

Language: Japanese - Date: 2009-04-24 05:18:27
    102FOR IMMEDIATE RELEASE MEDIA CONTACT: Cathy Herholdt, World Concernofficecell)

    FOR IMMEDIATE RELEASE MEDIA CONTACT: Cathy Herholdt, World Concernofficecell)

    Add to Reading List

    Source URL: worldconcern.org

    Language: English - Date: 2014-04-03 13:37:42
    1031  Auditing Distributed Databases A new paradigm is among us beyond the “Cloud” or mobile devices, and that is with the use of Distributed Database Systems (DDS). Though they have been around for the better part of a

    1 Auditing Distributed Databases A new paradigm is among us beyond the “Cloud” or mobile devices, and that is with the use of Distributed Database Systems (DDS). Though they have been around for the better part of a

    Add to Reading List

    Source URL: cloudsecurityalliance.org

    Language: English - Date: 2015-04-27 14:00:07
    104Mobile multifactor security  A revolution in authentication and digital signing Mobile multifactor security

    Mobile multifactor security A revolution in authentication and digital signing Mobile multifactor security

    Add to Reading List

    Source URL: www.aeteurope.com

    Language: English - Date: 2016-03-09 10:48:03
    105THE FACTS: MOBILE DEVICES Everyone’s on the go these days and taking smartphones, laptops, tablets and other devices along to get information, shop, manage documents, and of course communicate with friends and family.

    THE FACTS: MOBILE DEVICES Everyone’s on the go these days and taking smartphones, laptops, tablets and other devices along to get information, shop, manage documents, and of course communicate with friends and family.

    Add to Reading List

    Source URL: www.arcyber.army.mil

    Language: English - Date: 2016-05-06 22:38:46
    106Microsoft Word - Texas_DOT_and_Twincrest.docx

    Microsoft Word - Texas_DOT_and_Twincrest.docx

    Add to Reading List

    Source URL: www.intuicom.com

    Language: English - Date: 2015-10-01 16:24:39
    107mobile Security  Live-Hacking-Performance als Sensibilisierungsmaßnahme – Ein Erfahrungsbericht

    mobile Security Live-Hacking-Performance als Sensibilisierungsmaßnahme – Ein Erfahrungsbericht

    Add to Reading List

    Source URL: norbert-pohlmann.com

    Language: German - Date: 2015-10-20 13:20:37
      108Electronic Stores What should I consider suspicious? Suspicious People What should I do? Be part of the solution.

      Electronic Stores What should I consider suspicious? Suspicious People What should I do? Be part of the solution.

      Add to Reading List

      Source URL: www.homelandsecurity.ohio.gov

      Language: English - Date: 2013-01-30 08:13:52
      109Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets Yajin Zhou Zhi Wang Wu Zhou Xuxian Jiang Department of Computer Science North Carolina State University {yajin zhou,zhi

      Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets Yajin Zhou Zhi Wang Wu Zhou Xuxian Jiang Department of Computer Science North Carolina State University {yajin zhou,zhi

      Add to Reading List

      Source URL: yajin.org

      Language: English
      110HENDRIK PILZ Director Technical Lab / Mobile Security | CeBIT 2014 ANDROID MOBILE SECURITY Im Langzeittest

      HENDRIK PILZ Director Technical Lab / Mobile Security | CeBIT 2014 ANDROID MOBILE SECURITY Im Langzeittest

      Add to Reading List

      Source URL: www.av-test.org

      Language: English - Date: 2014-03-21 11:42:11