Loading…

Mobile phone security and forensics a practical approach /

Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of m...

Full description

Saved in:
Bibliographic Details
Main Author: Androulidakis, Iosif I.
Corporate Author: SpringerLink (Online service)
Format: eBook
Language:English
Published: New York : Springer, ©2012.
New York : [2012]
Series:SpringerBriefs in electrical and computer engineering.
Physical Description:
1 online resource (xi, 105 pages) : color illustrations.
Subjects:
Online Access:SpringerLink - Click here for access

MARC

LEADER 00000cam a2200000 a 4500
001 ocn785149449
003 OCoLC
005 20240223121953.0
006 m o d
007 cr cnu---unuuu
008 120410s2012 nyua ob 000 0 eng d
019 |a 820321114  |a 985050706  |a 1005785866  |a 1026425797  |a 1066619508  |a 1086968527  |a 1111020601  |a 1162695852  |a 1204098676  |a 1206337340 
020 |a 9781461416500  |q (electronic bk.) 
020 |a 1461416507  |q (electronic bk.) 
020 |a 1461416493 
020 |a 9781461416494 
020 |z 9781461416494 
024 7 |a 10.1007/978-1-4614-1650-0  |2 doi 
035 |a (OCoLC)785149449  |z (OCoLC)820321114  |z (OCoLC)985050706  |z (OCoLC)1005785866  |z (OCoLC)1026425797  |z (OCoLC)1066619508  |z (OCoLC)1086968527  |z (OCoLC)1111020601  |z (OCoLC)1162695852  |z (OCoLC)1204098676  |z (OCoLC)1206337340 
037 |b Springer 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d ZMC  |d COO  |d YDXCP  |d OCLCQ  |d E7B  |d NLGGC  |d BEDGE  |d OCLCQ  |d IDEBK  |d OCLCQ  |d VT2  |d Z5A  |d OCLCQ  |d ESU  |d IOG  |d REB  |d OCLCF  |d CNCGM  |d OCLCQ  |d CEF  |d U3W  |d WYU  |d OCLCQ  |d YOU  |d TKN  |d LEAUB  |d OL$  |d OCLCQ  |d AJS  |d DCT  |d BRF  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
049 |a COM6 
050 4 |a TK6564.4.C45  |b A53 2012 
072 7 |a TJK  |2 bicssc 
072 7 |a TEC041000  |2 bisacsh 
082 0 4 |a 621.3845/6  |2 23 
100 1 |a Androulidakis, Iosif I.  |0 https://id.loc.gov/authorities/names/no2012094742. 
245 1 0 |a Mobile phone security and forensics :  |b a practical approach /  |c Iosif I. Androulidakis. 
260 |a New York :  |b Springer,  |c ©2012. 
264 1 |a New York :  |b Springer,  |c [2012] 
264 4 |c ©2012. 
300 |a 1 online resource (xi, 105 pages) :  |b color illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file. 
347 |b PDF. 
490 1 |a SpringerBriefs in electrical and computer engineering,  |x 2191-8112. 
504 |a Includes bibliographical references. 
505 0 0 |t Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones --  |t A Multinational Survey on Users' Practices, Perceptions, and Awareness Regarding Mobile Phone Security --  |t Voice, SMS, and Identification Data Interception in GSM --  |t Software and Hardware Mobile Phone Tricks --  |t SMS Security Issues --  |t Mobile Phone Forensics --  |t Conclusion. 
520 |a Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used?against? users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. 
650 0 |a Cell phones  |0 https://id.loc.gov/authorities/subjects/sh98003865  |x Security measures.  |0 https://id.loc.gov/authorities/subjects/sh99005297. 
650 0 |a Data protection.  |0 https://id.loc.gov/authorities/subjects/sh85035859. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Téléphones cellulaires  |x Sécurité  |x Mesures. 
650 7 |a Ingénierie.  |2 eclas. 
650 7 |a Data protection.  |2 fast. 
653 4 |a Engineering. 
653 4 |a Data protection. 
653 4 |a Telecommunication. 
653 4 |a Communications Engineering, Networks. 
653 4 |a Systems and Data Security. 
653 4 |a Security Science and Technology. 
653 4 |a Forensic Science. 
710 2 |a SpringerLink (Online service)  |0 https://id.loc.gov/authorities/names/no2005046756. 
776 0 8 |i Print version:  |a Androulidakis, Iosif I.  |t Mobile phone security and forensics.  |d New York : Springer, ©2012  |w (DLC) 2012934151. 
830 0 |a SpringerBriefs in electrical and computer engineering.  |0 https://id.loc.gov/authorities/names/no2011108018. 
907 |a .b35348811  |b multi  |c -  |d 120424  |e 240320 
998 |a (3)cue  |a cc  |a cu  |b 240227  |c m  |d z   |e -  |f eng  |g nyu  |h 0  |i 3 
948 |a MARCIVE Overnight, in 2024.03 
948 |a MARCIVE Comp, in 2022.12 
948 |a MARCIVE Over, 07/2021 
948 |a MARCIVE Comp, 2019.12 
948 |a MARCIVE Comp, 2018.05 
948 |a MARCIVE August, 2017 
948 |a MARCIVE extract Aug, 5 2017 
994 |a 92  |b COM 
995 |a Loaded with m2btab.ltiac in 2024.03 
995 |a Loaded with m2btab.elec in 2024.02 
995 |a Loaded with m2btab.ltiac in 2022.12 
995 |a Loaded with m2btab.ltiac in 2021.07 
995 |a Loaded with m2btab.elec in 2021.06 
995 |a Loaded with m2btab.ltiac in 2019.12 
995 |a Loaded with m2btab.ltiac in 2018.06 
995 |a Loaded with m2btab.ltiac in 2017.08 
995 |a Loaded with m2btab.elec in 2016 
995 |a Loaded with m2btab.elec in 2016 
995 |a OCLC offline update by CMU 
999 |e z 
999 |a cue 
989 |d cueme  |e  - -   |f  - -   |g -   |h 0  |i 0  |j 200  |k 240227  |l $0.00  |m    |n  - -   |o -  |p 0  |q 0  |t 0  |x 0  |w SpringerLink  |1 .i150311023  |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-1-4614-1650-0  |3 SpringerLink  |z Click here for access