Search Results for Mobile Computing -- Security measures - Narrowed by: ReferenceSirsiDynix Enterprisehttp://kllibrary.dbkl.gov.my/client/en_US/pkl/pkl/qu$003dMobile$002bComputing$002b--$002b$002bSecurity$002bmeasures$0026qf$003dLOCATION$002509Shelf$002bLocation$0025091$00253AREFERENCE$002509Reference$0026ps$003d300?2025-12-25T20:01:30ZWireless and mobile device securityent://SD_ILS/0/SD_ILS:2405222025-12-25T20:01:30Z2025-12-25T20:01:30ZDoherty, Jim, 1968-<br/>2016<br/>Perpustakaan Kuala Lumpur Perpustakaan Kuala Lumpur, Cawangan Bandar Baru Sentul Perpustakaan Kuala Lumpur, Cawangan Taman Tun Dr Ismail<br/>ISBN 9781284059274<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1915732025-12-25T20:01:30Z2025-12-25T20:01:30ZHoog, Andrew.<br/>2011<br/>Perpustakaan Kuala Lumpur<br/>ISBN 9781597496513<br/>