Mobile malware attacks and defense [electronic resource] / Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.].

Contributor(s): Dunham, KenMaterial type: TextTextPublisher: Burlington, MA : Syngress/Elsevier, c2009Description: 1 online resource (xxv, 409 p.) : illISBN: 9780080949192 (electronic bk.); 0080949193 (electronic bk.)Subject(s): Cell phone systems -- Security measures | Mobile communication systems -- Security measures | Mobile computing -- Security measures | Computer crimes -- Prevention | Computer crimes -- Case studies | Computer hackers | Wireless Internet -- Security measuresGenre/Form: Electronic books.Additional physical formats: Print version:: Mobile malware attacks and defense.DDC classification: 005.8 LOC classification: TK5102.85 | .M62 2009Online resources: ScienceDirect
Contents:
Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures.
Summary: Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.

Includes bibliographical references and index.

Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures.

There are no comments on this title.

to post a comment.


Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha