Odgovor: |
Knjige: - Varga, Matija: Zaštita elektroničkih informacija. Varaždin : Veleučilište, 2012 - sign. 004(075.8) /VAR/ z
- Grbavac, Vitomir: Komunikacijski sustavi : teorijska utemeljenost, zbilja, aplikacija, vizija. Zagreb : Doik, 2008 - sign. 007(075.8) /GRB/ k OP
- Teković, Alberto: Bežične računalne mreže : priručnik. Zagreb : Algebra, 2010 - sign. 004 /TEK/ b OP
Članci u časopisima: - Varga, Matija: Zaštita elektroničkih podataka. // Tehnički glasnik. - 5 (2011), 1 ; str. 61-73
EBSCO HOst (pristup u GISKO ili putem CARNet Centra za online baze - Proxy): - Collett, S. (2008). Protecting the mobile workforce. (cover story). Networkworld Asia, 4(6), 32-35.
- Garretson, C. (2007). Mobile devices expose networks to security threats. Network World, 24(8), 11.
- Mobile Phone Technology: Don't Ignore the Potential Dangers of a Data Breach. (2012). Managing Accounts Payable, 12(10), 8.
- Geier, E. E. (2011). 2012 in Security: Rising Danger [computer security]. PC World (US Edition), 29(12), 35-36.
- Berman, J., & Bruening, P. (2001). Is Privacy Still Possible in the Twenty-first Century?. Social Research, 68(1), 306-318.
Google Books: - Iosif I Androulidakis: Mobile phone security and forensics : a practical approach. New York : Springer, ©2012.
- 2013 International Conference on Computer Science and Artificial Intelligence (ICCSAI 2013). Lancaster : DEStech Publications Inc. 2013
|