TIENE EN SU CESTA DE LA COMPRA
en total 0,00 €
Features
Gathers and analyzes the latest attacks, solutions, and trends in mobile networks
Covers attacks and solutions related to mobile networks, mobile phone security, and wireless security
Examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues
Includes many attack samples that present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment
Summary
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.
Table of Contents
Introduction to Mobile Malware. Visual Payloads. Timeline of Mobile Malware, Hoaxes, and Threats. Overview of Mobile Malware Families. Taxonomy of Mobile Malware. Phishing, SMishing, and Vishing. Operating System and Device Vulnerabilities. Analyzing Mobile Malware. Forensic Analysis of Mobile Malware. Debugging and Disassembling of Mobile Malicious Code. Mobile Malware Mitigation Measures.