You copied the Doc URL to your clipboard.

External publications

Refer to the following publications from third parties:

  • Trusted Computing Group: Securing Mobile Devices on Converged Networks

    https://www.trustedcomputinggroup.org/groups/mobile/Final_iGR_mobile_security_white_paper_sept_2006.pdf

  • Reuters UK: R u getting the msg about stolen mobiles?

    http://uk.reuters.com/article/domesticNews/idUKL2175341320070621

  • US Department of Transportation: The Incidence Rate of Odometer Fraud

    http://www.nhtsa.dot.gov/cars/rules/regrev/evaluate/pdf/809441.pdf

  • Washington Post: Lost a BlackBerry? Data Could Open a Security Breach

    http://www.washingtonpost.com/wp-dyn/content/article/2005/07/24/AR2005072401135.html

  • Securing Java, G. McGraw and E. Felten

    http://www.securingjava.com

Was this page helpful? Yes No