Protecting Mobile Networks and Devices
Challenges and Solutions
Herausgeber: Meng, Weizhi; Zhou, Jianying; Furnell, Steven; Luo, Xiapu
Protecting Mobile Networks and Devices
Challenges and Solutions
Herausgeber: Meng, Weizhi; Zhou, Jianying; Furnell, Steven; Luo, Xiapu
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues
Andere Kunden interessierten sich auch für
- IoT Applications, Security Threats, and Countermeasures70,99 €
- Paul LambertThe Data Protection Officer54,99 €
- David R MatthewsElectronically Stored Information54,99 €
- Multimedia Security Handbook73,99 €
- Dan ShoemakerA Guide to the National Initiative for Cybersecurity Education (Nice) Cybersecurity Workforce Framework (2.0)59,99 €
- Collaborative Cyber Threat Intelligence53,99 €
- Leo NotenboomThe Ask Leo! Guide to Online Privacy: Protecting yourself from an ever-intrusive world24,99 €
-
-
-
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 319
- Erscheinungstermin: 30. September 2020
- Englisch
- Abmessung: 254mm x 178mm x 18mm
- Gewicht: 585g
- ISBN-13: 9780367658311
- ISBN-10: 0367658313
- Artikelnr.: 60010904
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: CRC Press
- Seitenzahl: 319
- Erscheinungstermin: 30. September 2020
- Englisch
- Abmessung: 254mm x 178mm x 18mm
- Gewicht: 585g
- ISBN-13: 9780367658311
- ISBN-10: 0367658313
- Artikelnr.: 60010904
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Weizhi Meng received his BE in computer science from the Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China and earned his PhD in the Department of Computer Science from the City University of Hong Kong (CityU), Kowloon, Hong Kong. He was known as Yuxin Meng and is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark. Prior to that, he worked as a research scientist in Infocomm Security Department, Institute for Infocomm Research, Singapore, and as a senior research associate in CityU after graduation. His research interests are cyber security including intrusion detection, mobile security and biometric authentication, malware detection, HCI security, cloud security, and intelligent security applications. He won the Outstanding Academic Performance Award during his doctoral study and is a recipient of The HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014. Xiapu Luo is a research assistant professor in the Department of Computing and an associate researcher at the Shenzhen Research Institute at the Hong Kong Polytechnic University. His research focuses on mobile networks, smartphone security, network security and privacy, and Internet measurement. Luo has a PhD in computer science from the Hong Kong Polytechnic University. Steven Furnell is a professor of information systems security and leads the Centre for Security, Communications & Network Research at Plymouth University. He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela Metropolitan University in South Africa. His research interests include mobile security, the usability of security technologies, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 270 papers in refereed international journals and conference proceedings, as well as books including Cybercrime: Vandalizing the Information Society (2001) and Computer Insecurity: Risking the System (2005). Prof. Furnell is the BCS representative to Technical Committee 11 (security and privacy) within the International Federation for Information Processing, and is a member of related working groups on security management, security education, and human aspects of security. He is also a board member of the Institute of Information Security Professionals, and chairs the academic partnership committee and southwest branch. Further details can be found at www.plymouth.ac.uk/cscan, with a variety of security podcasts also available via www.cscan.org/podcasts. Steve can also be followed on Twitter (@smfurnell). Jianying Zhou received the Ph.D. degree in information security from Royal Holloway, University of London, U.K. He is a Principal Scientist with the Institute for Infocomm Research and the Head of the Infocomm Security Department. His research interests include applied cryptography, computer and network security, cyber-physical security, mobile and wireless security.
Introduction to Mobile Malware. Visual Payloads. Timeline of Mobile
Malware, Hoaxes, and Threats. Overview of Mobile Malware Families. Taxonomy
of Mobile Malware. Phishing, SMishing, and Vishing. Operating System and
Device Vulnerabilities. Analyzing Mobile Malware. Forensic Analysis of
Mobile Malware. Debugging and Disassembling of Mobile Malicious Code.
Mobile Malware Mitigation Measures.
Malware, Hoaxes, and Threats. Overview of Mobile Malware Families. Taxonomy
of Mobile Malware. Phishing, SMishing, and Vishing. Operating System and
Device Vulnerabilities. Analyzing Mobile Malware. Forensic Analysis of
Mobile Malware. Debugging and Disassembling of Mobile Malicious Code.
Mobile Malware Mitigation Measures.
Introduction to Mobile Malware. Visual Payloads. Timeline of Mobile
Malware, Hoaxes, and Threats. Overview of Mobile Malware Families. Taxonomy
of Mobile Malware. Phishing, SMishing, and Vishing. Operating System and
Device Vulnerabilities. Analyzing Mobile Malware. Forensic Analysis of
Mobile Malware. Debugging and Disassembling of Mobile Malicious Code.
Mobile Malware Mitigation Measures.
Malware, Hoaxes, and Threats. Overview of Mobile Malware Families. Taxonomy
of Mobile Malware. Phishing, SMishing, and Vishing. Operating System and
Device Vulnerabilities. Analyzing Mobile Malware. Forensic Analysis of
Mobile Malware. Debugging and Disassembling of Mobile Malicious Code.
Mobile Malware Mitigation Measures.