Mobile Computing Security

Mobile Computing Security

Black Hat via YouTube Direct link

In intermittently connected clients

2 of 21

2 of 21

In intermittently connected clients

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Mobile Computing Security

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 In intermittently connected clients
  3. 3 In conference computer centers
  4. 4 Passphrases
  5. 5 Biometrics
  6. 6 ICCs
  7. 7 HR Database
  8. 8 ICC
  9. 9 Hardrick Compromise
  10. 10 Data Theft
  11. 11 RF Interception
  12. 12 Wireless Networking
  13. 13 Im on the inside
  14. 14 Combining useless information
  15. 15 Software tampering
  16. 16 Vectoring
  17. 17 VPNs
  18. 18 PeertoPeer
  19. 19 Better Authentication
  20. 20 Security Awareness
  21. 21 Information Security

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.