ABSTRACT
This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.
TABLE OF CONTENTS
part |2 pages
SECTION I: AUTHENTICATION TECHNIQUES FOR MOBILE DEVICES
part |2 pages
SECTION II: MOBILE DEVICE PRIVACY
part |2 pages
SECTION III: MOBILE OPERATING SYSTEM VULNERABILITIES
part |2 pages
SECTION IV: MALWARE CLASSIFICATION AND DETECTION
part |2 pages
SECTION V: MOBILE NETWORK SECURITY