Atjaunināt sīkdatņu piekrišanu

E-grāmata: Protecting Mobile Networks and Devices: Challenges and Solutions

Edited by (The Hong Kong Polytechnic University, Hung Hom, Hong Kong, People's Republic of China), Edited by (Plymouth University, United Kingdom), Edited by (Singapore University of ), Edited by (Institute for Infocomm Research, Infocomm Security (ICS) Department, Singapore)
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 55,10 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

Introduction vii
Editors ix
Contributors xi
SECTION I AUTHENTICATION TECHNIQUES FOR MOBILE DEVICES
1 Exploring Mobile Authentication Mechanisms from Personal Identification Numbers to Biometrics Including the Future Trend
3(26)
Florentin Thullier
Bruno Bouchard
Bob-Antoine J. Menelas
2 When Seeing Is Not Believing: Defeating MFF-Based Attacks Using Liveness Detection for Face Authentication on Mobile Platforms
29(20)
Yan Li
Qiang Yan
Yingjiu Li
Robert H. Deng
3 Visual Authentication Based on Visual Cryptography Using Mobile Devices
49(18)
Yang-Wai Chow
Willy Susilo
Man Ho Au
Ari Moesriami Barmawi
SECTION II MOBILE DEVICE PRIVACY
4 Dealing with User Privacy in Mobile Apps: Issues and Mitigation
67(26)
Ricardo Neisse
Dimitris Geneiatakis
Gary Steri
Georgios Kambourakis
Igor Nai Fovino
Riccardo Satta
5 An Empirical Study on Android for Saving Nonshared Data on Public Storage
93(30)
Xiangyu Liu
Zhe Zhou
Wenrui Diao
Zhou Li
Kehuan Zhang
SECTION III MOBILE OPERATING SYSTEM VULNERABILITIES
6 Security Analysis on Android and iOS
123(32)
Jin Han
7 Protecting Android Apps against Reverse Engineering
155(26)
Wenjun Hu
Xiaobo Ma
Xiapu Luo
SECTION IV MALWARE CLASSIFICATION AND DETECTION
8 Efficient Classification of Android Malware in the Wild Using Robust Static Features
181(28)
Hossein Fereidooni
Veelasha Moonsamy
Mauro Conti
Lejla Batina
9 An Empirical Analysis of Android Banking Malware
209(26)
Andi Fitriah A. Kadir
Natalia Stakhanova
Ali A. Ghorbani
SECTION V MOBILE NETWORK SECURITY
10 Physical Layer Security in the Last Mile Technology of Mobile Networks
235(26)
Ozge Cepheli
Volker Lucken
Gunes Karabulut Kurt
Guido Dartmann
Gerd Ascheid
11 Protecting Mobile Payments Security: A Case Study
261(30)
Bo Xing
12 Cyberattack Surface of Next-Generation Mobile Networks
291(22)
Filipo Sharevski
Index 313
Weizhi Meng received his BE in computer science from the Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China and earned his PhD in the Department of Computer Science from the City University of Hong Kong (CityU), Kowloon, Hong Kong. He was known as Yuxin Meng and is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark. Prior to that, he worked as a research scientist in Infocomm Security Department, Institute for Infocomm Research, Singapore, and as a senior research associate in CityU after graduation. His research interests are cyber security including intrusion detection, mobile security and biometric authentication, malware detection, HCI security, cloud security, and intelligent security applications. He won the Outstanding Academic Performance Award during his doctoral study and is a recipient of The HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014.

Xiapu Luo is a research assistant professor in the Department of Computing and an associate researcher at the Shenzhen Research Institute at the Hong Kong Polytechnic University. His research focuses on mobile networks, smartphone security, network security and privacy, and Internet measurement. Luo has a PhD in computer science from the Hong Kong Polytechnic University.

Steven Furnell is a professor of information systems security and leads the Centre for Security, Communications & Network Research at Plymouth University. He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela Metropolitan University in South Africa. His research interests include mobile security, the usability of security technologies, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 270 papers in refereed international journals and conference proceedings, as well as books including Cybercrime: Vandalizing the Information Society (2001) and Computer Insecurity: Risking the System (2005). Prof. Furnell is the BCS representative to Technical Committee 11 (security and privacy) within the International Federation for Information Processing, and is a member of related working groups on security management, security education, and human aspects of security. He is also a board member of the Institute of Information Security Professionals, and chairs the academic partnership committee and southwest branch. Further details can be found at www.plymouth.ac.uk/cscan, with a variety of security podcasts also available via www.cscan.org/podcasts. Steve can also be followed on Twitter (@smfurnell).

Jianying Zhou received the Ph.D. degree in information security from Royal Holloway, University of London, U.K. He is a Principal Scientist with the Institute for Infocomm Research and the Head of the Infocomm Security Department. His research interests include applied cryptography, computer and network security, cyber-physical security, mobile and wireless security.