Mobile Computing and Networking



Download 252,25 Kb.
bet21/22
Sana22.07.2021
Hajmi252,25 Kb.
#126088
1   ...   14   15   16   17   18   19   20   21   22
Bog'liq
Term Paper edited

Conclusion



Mobile computing wasn’t any part of past, but it will dominate future.

Appendix


Appendix A: Mobile Computing Timeline of Key Events from 1894 through 1983 (Livingston)





Appendix B: Mobile Computing Timeline of Key Events from 2007 through 2010 (Ernst & Young “Mobile”)





Works Cited


Aldhizer, George R., III, and John R. Bowles, Jr. "Mitigating the Growing Threat to Sensitive Data: 21st Century Mobile Devices." The CPA Journal LXXXI.5 (2011): 58-63. Web. 30 Nov. 2014.
Baig, Edward. "Apple Pay: The Promise, Challenges Facing Digital Wallets." Detroit Free Press n.d.: n. pag. Detroit Free Press. 3 Oct. 2014. Web. 30 Nov. 2014
Chapungu, George. "Limitations of Mobile Computing." Web log post.Wells Digest. N.p., 1 Aug. 2013. Web. 30 Nov. 2014.
Chebyshev, Victor, and Roman Unuchek. "Mobile Malware Evolution: 2013." SECURELIST. Kaspersky Lab, 24 Feb. 2013. Web. 30 Nov. 2014.
Constantin, Lucian. "Security Analysis of Mobile Banking Apps Reveals Significant Weaknesses." PCWorld. IDG Consumer & SMB, 9 Jan. 2014. Web. 30 Nov. 2014.
Drew, Jeff. "Technology and CPAs: Visions of the Future." Journal of Accountancy. AICPA, June 2012. Web. 30 Nov. 2014.
Ernst & Young. Bring Your Own Device: Security and Risk Considerations for Your Mobile Device Program. Publication no. AU 1850. N.p.: EYGM, 2012. Print. Insights on Governance, Risk, and Compliance Collection.
Ernst & Young. Mobile Device Security: Understanding Vulnerabilities and Managing Risks. Publication no. AU1070. N.p.: EYGM, 2012. Print. Insights on Governance, Risk, and Compliance Collection.
Harris, William. "How Mobile Banking Works - HowStuffWorks."HowStuffWorks. InfoSpace LLC, n.d. Web. 30 Nov. 2014. 
Livingston, David. "Introduction & History of Mobile Computing."Slideshare. Linkedin Corporation, 5 Dec. 2013. Web. 30 Nov. 2014.
Lundeen, Daniel. A Brief Discussion about Security Issues in the SMS World. Rep. N.p., n.d. Web. 30 Nov. 2014.
Martin, James. "Mobile Computing: PDAs vs. Smart Phones." TechHive. N.p., 26 Aug. 2004. Web. 30 Nov. 2014.
"Mobile Banking." Gemalto. N.p., n.d. Web. 30 Nov. 2014. .

Aldhizer, George R., III, and John R. Bowles, Jr. "Mitigating the Growing Threat to Sensitive Data: 21st Century Mobile Devices." The CPA Journal LXXXI.5 (2011): 58-63. Web. 30 Nov. 2014.


Baig, Edward. "Apple Pay: The Promise, Challenges Facing Digital Wallets." Detroit Free Press n.d.: n. pag. Detroit Free Press. 3 Oct. 2014. Web. 30 Nov. 2014
Chapungu, George. "Limitations of Mobile Computing." Web log post.Wells Digest. N.p., 1 Aug. 2013. Web. 30 Nov. 2014.
Chebyshev, Victor, and Roman Unuchek. "Mobile Malware Evolution: 2013." SECURELIST. Kaspersky Lab, 24 Feb. 2013. Web. 30 Nov. 2014.
Constantin, Lucian. "Security Analysis of Mobile Banking Apps Reveals Significant Weaknesses." PCWorld. IDG Consumer & SMB, 9 Jan. 2014. Web. 30 Nov. 2014.
Drew, Jeff. "Technology and CPAs: Visions of the Future." Journal of Accountancy. AICPA, June 2012. Web. 30 Nov. 2014.
Ernst & Young. Bring Your Own Device: Security and Risk Considerations for Your Mobile Device Program. Publication no. AU 1850. N.p.: EYGM, 2012. Print. Insights on Governance, Risk, and Compliance Collection.
Ernst & Young. Mobile Device Security: Understanding Vulnerabilities and Managing Risks. Publication no. AU1070. N.p.: EYGM, 2012. Print. Insights on Governance, Risk, and Compliance Collection.
Harris, William. "How Mobile Banking Works - HowStuffWorks."HowStuffWorks. InfoSpace LLC, n.d. Web. 30 Nov. 2014. 
Livingston, David. "Introduction & History of Mobile Computing."Slideshare. Linkedin Corporation, 5 Dec. 2013. Web. 30 Nov. 2014.
Lundeen, Daniel. A Brief Discussion about Security Issues in the SMS World. Rep. N.p., n.d. Web. 30 Nov. 2014.
Martin, James. "Mobile Computing: PDAs vs. Smart Phones." TechHive. N.p., 26 Aug. 2004. Web. 30 Nov. 2014.
"Mobile Banking." Gemalto. N.p., n.d. Web. 30 Nov. 2014. .

Mobile Computing: A Study of Internal Auditors’ Awareness. Rep. Dallas Chapter Institute of Internal Auditors, 2013. Web. 30 Nov. 2014.
"Mobile Cyber-attacks Surge as Hackers Chase Banking Info." RT News. TV-Novosti, 22 Oct. 2014. Web. 30 Nov. 2014. 

Newab, Ahmad. Mobile Commerce. Rep. Academia.edu, n.d. Web. 30 Nov. 2014.
Okoye, John. "How Mobile Computing Changed Business Strategy."Techopedia. Janalta Interactive Inc., 19 Sept. 2013. Web. 30 Nov. 2014.

Paro, Dwayne. WIRELESS APPLICATION PROTOCOL. Rep. SANS Institute, n.d. Web. 30 Nov. 2014.
"Phishing." TechTerms. N.p., n.d. Web. 30 Nov. 2014.
Rouse, Margaret. "Nomadic Computing (mobile Computing)." TechTarget. N.p., May 2007. Web. 30 Nov. 2014.
SHORT MESSAGE SERVICE SECURITY. Rep. The Government of the Hong Kong Special Administrative Region, Feb. 2008. Web. 1 Dec. 2014.
Androulidakis. "SMS Security Issues." Mobile Phone Security and Forensics a Practical Approach. New York: Springer, 2012. 65. Print.
Umar A. (P18-20). Mobile Computing and Wireless Communication. NGE Solutions.
2014 Cost of Data Breach Study: United States. Rep. Ponemon Institute, May 2014. Web. 30 Nov.2014.


Download 252,25 Kb.

Do'stlaringiz bilan baham:
1   ...   14   15   16   17   18   19   20   21   22




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish