<p><p>This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones
Mobile Phone Security and Forensics: A Practical Approach
β Scribed by Iosif I. Androulidakis (auth.)
- Publisher
- Springer-Verlag New York
- Year
- 2012
- Tongue
- English
- Leaves
- 113
- Series
- SpringerBriefs in electrical and computer engineering
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used βagainstβ users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis.
β¦ Table of Contents
Front Matter....Pages i-xi
Introduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones....Pages 1-11
A Multinational Survey on Usersβ Practices, Perceptions, and Awareness Regarding Mobile Phone Security....Pages 13-23
Voice, SMS, and Identification Data Interception in GSM....Pages 25-38
Software and Hardware Mobile Phone Tricks....Pages 39-62
SMS Security Issues....Pages 63-74
Mobile Phone Forensics....Pages 75-99
Conclusion....Pages 101-103
Back Matter....Pages 105-105
β¦ Subjects
Communications Engineering, Networks;Systems and Data Security;Security Science and Technology;Forensic Science
π SIMILAR VOLUMES
<p><p>PBX Security and Forensics presents readers with theoretical and practical background for Private Branch Exchanges (PBXs). PBX is privately owned equipment that serve the communication needs of a private or public entity making connections among internal telephones and linking them to other us
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving P
<p><p>This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics invol
<span><p><b>Investigate, analyze, and report iOS, Android, and Windows devices</b></p><p><b>About This Book</b></p><ul><li>Get hands-on experience in performing simple to complex mobile forensics techniques.</li><li>Retrieve and analyze data stored not only on mobile devices but also through the clo
Investigate, analyze, and report iOS, Android, and Windows devices Key Features β’ Get hands-on experience in performing simple to complex mobile forensics techniques β’ Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected mediums β’ A practic