Amazon cover image
Image from Amazon.com
Image from Coce

Security for mobile networks and platforms Selim Aissi, Nora Dabbous and Anand R. Prasad

By: Contributor(s): Publication details: Boston: Artech House Publishers, 2006.Description: 313pISBN:
  • 159693008x
  • 9781596930087
Subject(s): DDC classification:
  • 621.384 AIS
Summary: With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Central Library Allama Iqbal Open University Islamabad General Stacks 621.384 AIS (Browse shelf(Opens below)) Available 111435

HB

With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats.

Eng

There are no comments on this title.

to post a comment.

Copyright © 2025, All rights reserved,
Central Library, AIOU, Islamabad Pakistan.