Mobile security

Results: 2765



#Item
41Challenges in Security and Privacy for Mobile Edge-Clouds Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan CMU-PDLOct 2013

Challenges in Security and Privacy for Mobile Edge-Clouds Jiaqi Tan, Rajeev Gandhi, Priya Narasimhan CMU-PDLOct 2013

Add to Reading List

Source URL: www.pdl.cmu.edu

- Date: 2014-04-03 14:00:51
    42Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

    Laying a Secure Foundation for Mobile Devices Stephen Smalley Trusted Systems Research National Security Agency

    Add to Reading List

    Source URL: www.incose-cc.org

    - Date: 2015-10-31 23:19:08
      43TREND MICRO™ Mobile Security 5.0 for iOS - Product Guide V1.0  Trend Micro, Incorporated—US Headquarters

      TREND MICRO™ Mobile Security 5.0 for iOS - Product Guide V1.0 Trend Micro, Incorporated—US Headquarters

      Add to Reading List

      Source URL: solutionfile.trendmicro.com

      - Date: 2016-09-13 16:18:39
        44UBICOMM 2014 : The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies  Event Driven Adaptive Security in Internet of Things Waqas Aman and Einar Snekkenes Norwegian Informa

        UBICOMM 2014 : The Eighth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies Event Driven Adaptive Security in Internet of Things Waqas Aman and Einar Snekkenes Norwegian Informa

        Add to Reading List

        Source URL: www.researchgate.net

          45PRODUKTINFORMATION  G DATA MOBILE INTERNET SECURITY SORGENFREI UNTERWEGS MIT ANDROID®-SMARTPHONE ODER -TABLET

          PRODUKTINFORMATION G DATA MOBILE INTERNET SECURITY SORGENFREI UNTERWEGS MIT ANDROID®-SMARTPHONE ODER -TABLET

          Add to Reading List

          Source URL: file.gdatasoftware.com

          - Date: 2016-09-09 02:17:29
            46PRODUKTINFORMATION  G DATA MOBILE INTERNET SECURITY SORGENFREI UNTERWEGS MIT iPHONE ODER iPAD

            PRODUKTINFORMATION G DATA MOBILE INTERNET SECURITY SORGENFREI UNTERWEGS MIT iPHONE ODER iPAD

            Add to Reading List

            Source URL: file.gdatasoftware.com

            - Date: 2016-08-03 04:45:53
              47Press Release Mobile Enablement Introduces Significant Security Threats to Enterprise IT, According to VDC Research Due to varied enterprise needs, a “one size fits all” solution to address mobile security remains el

              Press Release Mobile Enablement Introduces Significant Security Threats to Enterprise IT, According to VDC Research Due to varied enterprise needs, a “one size fits all” solution to address mobile security remains el

              Add to Reading List

              Source URL: www.vdcresearch.com

              - Date: 2016-02-01 13:56:03
                48Open Mobile API for OEMs: Enriches Mobile Platforms by Promoting Interoperability and the Highest Levels of Security for Connected Devices The emergence of smartphones and tablets

                Open Mobile API for OEMs: Enriches Mobile Platforms by Promoting Interoperability and the Highest Levels of Security for Connected Devices The emergence of smartphones and tablets

                Add to Reading List

                Source URL: simalliance.org

                - Date: 2016-01-26 04:46:29
                  49

                  PROPOSED POLICY P02Mobile Device Security Policy University employees and students who use a laptop computer or mobile device (e.g. portable hard drives, USB flash drives, smartphones, tablets) are responsibl

                  Add to Reading List

                  Source URL: alaska.edu

                  - Date: 2015-02-18 18:41:14
                    50Bright House Networks Home Security and Automation Mobile Application Quick Start Guide

                    Bright House Networks Home Security and Automation Mobile Application Quick Start Guide

                    Add to Reading List

                    Source URL: brighthouse.com

                    - Date: 2016-08-26 00:46:43