End to End Mobile Security /
The more that we become connected the more we need to be conscious of mobile security. Contacts, emails, passwords, location data, confidential documents, photos, etc. are all contained on our phones and thus are a prime target for malicious hackers and leaked data. It is critical to understand how...
Autor principal: | Minakata, Jeff (Autor, VerfasserIn.) |
---|---|
Autor Corporativo: | Safari, an O'Reilly Media Company (Contribuidor, MitwirkendeR.) |
Formato: | Video |
Idioma: | Inglés |
Publicado: |
[Erscheinungsort nicht ermittelbar] :
EC-Council,
2020
|
Edición: | 1st edition. |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Ejemplares similares
-
Securing Your Network from Attacks /
por: Minakata, Jeff
Publicado: (2020) -
Introduction to Cybersecurity /
por: Minakata, Jeff
Publicado: (2020) -
End-to-End Mobile Communications : Evolution to 5G /
por: Husain, Syed S., et al.
Publicado: (2021) -
End-to-end network security : defense-in-depth /
por: Santos, Omar
Publicado: (2007) -
End of life : what should we do for those who are dying?.
por: Menzise, Jeff
Publicado: (2016)