Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Mobile Security and Privacy

Mobile Security and Privacy

Great Research Book in Mobile Security and Privacy

Author(s) Name:  Man Ho Au and Kim-Kwang Raymond Choo

About the Book:

   As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks.
   Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security.
   The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy.

Table of contents

  • Chapter 1 - Mobile Security and Privacy
  • Chapter 2 - Mobile Security: A Practitioner’s Perspective
  • Chapter 3 - Mobile Security: End Users are the Weakest Link in the System
  • Chapter 4 - How Cyber-Savvy are Older Mobile Device Users?
  • Chapter 5 - The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness: A Practitioner’s Perspective
  • Chapter 6 - Supervised Learning Based Detection of Malware on Android
  • Chapter 7 - On Discovering Vulnerabilities in Android Applications
  • Chapter 8 - A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps
  • Chapter 9 - Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone
  • Chapter 10 - RESTful IoT Authentication Protocols
  • Chapter 11 - An Introduction to Various Privacy Models
  • Chapter 12 - Performance of Digital Signature Schemes on Mobile Devices
  • ISBN:  978-0-12-804629-6

    Publisher:  Science Direct

    Year of Publication:  2016

    Book Link:  Home Page Url