Abbey's Bookshop Logo
Go to my checkout basket
Login to Abbey's Bookshop
Register with Abbey's Bookshop
Gift Vouchers
Browse by Category

facebook
Google Book Preview
Protecting Mobile Networks and Devices: Challenges and Solutions
— —
Jianying Zhou Weizhi Meng
Protecting Mobile Networks and Devices: Challenges and Solutions by Jianying Zhou at Abbey's Bookshop,

Protecting Mobile Networks and Devices: Challenges and Solutions

Jianying Zhou Weizhi Meng Xiapu Luo Jianying Zhou (Institute for Infocomm Research, Singapore)


9781498735834

Productivity Press


WAP (wireless) technology;
Computer security


Hardback

319 pages

$116.00
We can order this in for you
How long will it take?
order qty:  
Add this item to my basket

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.

Edited by:   Jianying Zhou, Weizhi Meng, Xiapu Luo, Jianying Zhou (Institute for Infocomm Research, Singapore)
Imprint:   Productivity Press
Country of Publication:   United States
Dimensions:   Height: 254mm,  Width: 178mm, 
Weight:   748g
ISBN:   9781498735834
ISBN 10:   1498735835
Series:   Series in Security, Privacy and Trust
Pages:   319
Publication Date:   November 2016
Audience:   College/higher education ,  Professional and scholarly ,  Primary ,  Undergraduate
Format:   Hardback
Publisher's Status:   Active

Introduction to Mobile Malware. Visual Payloads. Timeline of Mobile Malware, Hoaxes, and Threats. Overview of Mobile Malware Families. Taxonomy of Mobile Malware. Phishing, SMishing, and Vishing. Operating System and Device Vulnerabilities. Analyzing Mobile Malware. Forensic Analysis of Mobile Malware. Debugging and Disassembling of Mobile Malicious Code. Mobile Malware Mitigation Measures.

Weizhi Meng received his BE in computer science from the Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China and earned his PhD in the Department of Computer Science from the City University of Hong Kong (CityU), Kowloon, Hong Kong. He was known as Yuxin Meng and is currently an assistant professor in the Department of Applied Mathematics and Computer Science, Technical University of Denmark, Kongens Lyngby, Denmark. Prior to that, he worked as a research scientist in Infocomm Security Department, Institute for Infocomm Research, Singapore, and as a senior research associate in CityU after graduation. His research interests are cyber security including intrusion detection, mobile security and biometric authentication, malware detection, HCI security, cloud security, and intelligent security applications. He won the Outstanding Academic Performance Award during his doctoral study and is a recipient of The HKIE Outstanding Paper Award for Young Engineers/Researchers in 2014. Xiapu Luo is a research assistant professor in the Department of Computing and an associate researcher at the Shenzhen Research Institute at the Hong Kong Polytechnic University. His research focuses on mobile networks, smartphone security, network security and privacy, and Internet measurement. Luo has a PhD in computer science from the Hong Kong Polytechnic University. Steven Furnell is a professor of information systems security and leads the Centre for Security, Communications & Network Research at Plymouth University. He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela Metropolitan University in South Africa. His research interests include mobile security, the usability of security technologies, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 270 papers in refereed international journals and conference proceedings, as well as books including Cybercrime: Vandalizing the Information Society (2001) and Computer Insecurity: Risking the System (2005). Prof. Furnell is the BCS representative to Technical Committee 11 (security and privacy) within the International Federation for Information Processing, and is a member of related working groups on security management, security education, and human aspects of security. He is also a board member of the Institute of Information Security Professionals, and chairs the academic partnership committee and southwest branch. Further details can be found at www.plymouth.ac.uk/cscan, with a variety of security podcasts also available via www.cscan.org/podcasts. Steve can also be followed on Twitter (@smfurnell). Jianying Zhou received the Ph.D. degree in information security from Royal Holloway, University of London, U.K. He is a Principal Scientist with the Institute for Infocomm Research and the Head of the Infocomm Security Department. His research interests include applied cryptography, computer and network security, cyber-physical security, mobile and wireless security.

My Shopping Basket
Your cart does not contain any items.