tags:

views:

16

answers:

0

i would like to know the different types of vulnerabilities that are possible in mobile computing environment. Also the tools that would be useful in detect the corresponding vulnerabilities.

Thank you..