Installieren Sie die genialokal App auf Ihrem Startbildschirm für einen schnellen Zugriff und eine komfortable Nutzung.
Tippen Sie einfach auf Teilen:
Und dann auf "Zum Home-Bildschirm [+]".
Bei genialokal.de kaufen Sie online bei Ihrer lokalen, inhabergeführten Buchhandlung!
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.
Weizhi Meng received his BE in computer science from the Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China and earned his PhD in the Department of Computer Science from the City University of Hong Kong (CityU), Kowloon, Hong Kong. He was known as Yuxin Meng and is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark. Prior to that, he worked as a research scientist in Infocomm Security Department, Institute for Infocomm Research, Singapore, and as a senior research associate in CityU after graduation. His research interests are cyber security including intrusion detection, mobile security and biometric authentication, malware detection, HCI security, cloud security, and intelligent security applications. He won the Outstanding Academic Performance Award during his doctoral study and is a recipient of The HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014. Xiapu Luo is a research assistant professor in the Department of Computing and an associate researcher at the Shenzhen Research Institute at the Hong Kong Polytechnic University. His research focuses on mobile networks, smartphone security, network security and privacy, and Internet measurement. Luo has a PhD in computer science from the Hong Kong Polytechnic University. Steven Furnell is a professor of information systems security and leads the Centre for Security, Communications & Network Research at Plymouth University. He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela Metropolitan University in South Africa. His research interests include mobile security, the usability of security technologies, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 270 papers in refereed international journals and conference proceedings, as well as books including Cybercrime: Vandalizing the Information Society (2001) and Computer Insecurity: Risking the System (2005). Prof. Furnell is the BCS representative to Technical Committee 11 (security and privacy) within the International Federation for Information Processing, and is a member of related working groups on security management, security education, and human aspects of security. He is also a board member of the Institute of Information Security Professionals, and chairs the academic partnership committee and southwest branch. Further details can be found at www.plymouth.ac.uk/cscan, with a variety of security podcasts also available via www.cscan.org/podcasts. Steve can also be followed on Twitter (@smfurnell). Jianying Zhou received the Ph.D. degree in information security from Royal Holloway, University of London, U.K. He is a Principal Scientist with the Institute for Infocomm Research and the Head of the Infocomm Security Department. His research interests include applied cryptography, computer and network security, cyber-physical security, mobile and wireless security.
Introduction to Mobile Malware. Visual Payloads. Timeline of Mobile Malware, Hoaxes, and Threats. Overview of Mobile Malware Families. Taxonomy of Mobile Malware. Phishing, SMishing, and Vishing. Operating System and Device Vulnerabilities. Analyzing Mobile Malware. Forensic Analysis of Mobile Malware. Debugging and Disassembling of Mobile Malicious Code. Mobile Malware Mitigation Measures.
Dieses eBook wird im PDF-Format geliefert und ist mit einem Adobe Kopierschutz (DRM) versehen. Sie können dieses eBook mit allen Geräten lesen, die das PDF-Format und den Adobe Kopierschutz (DRM) unterstützen.
Zum Beispiel mit den folgenden Geräten:
• tolino Reader
Laden Sie das eBook direkt über den Reader-Shop auf dem tolino herunter oder übertragen Sie das eBook auf Ihren tolino mit einer kostenlosen Software wie beispielsweise Adobe Digital Editions.
• Sony Reader & andere eBook Reader
Laden Sie das eBook direkt über den Reader-Shop herunter oder übertragen Sie das eBook mit der kostenlosen Software Sony READER FOR PC/Mac oder Adobe Digital Editions auf ein Standard-Lesegeräte mit epub- und Adobe DRM-Unterstützung.
• Tablets & Smartphones
Möchten Sie dieses eBook auf Ihrem Smartphone oder Tablet lesen, finden Sie hier unsere kostenlose Lese-App für iPhone/iPad und Android Smartphone/Tablets.
• PC & Mac
Lesen Sie das eBook direkt nach dem Herunterladen mit einer kostenlosen Lesesoftware, beispielsweise Adobe Digital Editions, Sony READER FOR PC/Mac oder direkt über Ihre eBook-Bibliothek in Ihrem Konto unter „Meine eBooks“ - „online lesen“.
Schalten Sie das eBook mit Ihrer persönlichen Adobe ID auf bis zu sechs Geräten gleichzeitig frei.
Bitte beachten Sie, dass die Kindle-Geräte das Format nicht unterstützen und dieses eBook somit nicht auf Kindle-Geräten lesbar ist.