CO DFP40263 Secure Mobile Computing
CO DFP40263 Secure Mobile Computing
COURSE OUTLINE
3. CREDIT VALUE 3
PREREQUISITE/ NONE
4.
CO-REQUISITE (IF ANY)
COURSE LEARNING OUTCOMES (CLO):
Upon completion of this course, students should be able to:
CLO1 Manipulate the aspect of mobile computing, model and security principles
using mobile computing technology to develop applications. (P3, PLO3)
Develop effective leadership and team work related to mobile secure
CLO2
environment. (A4, PLO5).
CLO3 Demonstrate best practices in developing mobile security computing
in context of social environment. (A3, PLO8)
ASSESSMENT METHOD:
The course assessment consist of:
i. Continuous Assessment (CA) – 70%
ii. Final Assessment (FA) – 30%
6.
(Practical Test)
REFERENCES Main :
1. Blokdyk. G. (2020). Security Vulnerabilities In Mobile
Operating Systems A Complete Guide - 2020 Edition Kindle
Edition. Kindle. (ASIN: B088NLZ2JC)
8. 2. Suparna. B. &. Sarmistha. N. (2017). Secure and Trusted
Checkpointing Recovery in Mobile Computing: On Design of
Mobility based Checkpointing Algorithms considering Security
and Trust in Mobile Cellular and Adhoc Network, LAP
LAMBERT Academic Publishing (ISBN: 9783330036222)
Additional :
1. Chestnykh. D. (2020). Password Authentication for Web and
Mobile Apps: The Developer's Guide To Building Secure User
Authentication. Independently published. (ISBN: 979-
8649303095)
2. Fadly. J. J. &. Farhana. A. P. (2018). Secure Mobile
Computing. Politeknik Sultan Abdul Halim Mu’adzam Shah.
(ISBN: 978-967-0830-51-3)
3. Au. M. H. & Choo. R. R. (2017). Mobile Security and Privacy:
Advances, Challenges and Future Research Directions,
Elsevier Inc. (ISBN: 9780128064296)
……………………… …………………………….
( Tandatangan dan Nama Pensyarah Kursus ( Tandatangan dan Nama TP(A)/TP/KJ/KPro/KUPA/KK )
Date : Date :