This eBook is intended for mobile and wireless professionals,managers,and students. It describes security principles and methods in a real-world context, discussing existing and emerging standards and technology trends. Because of the end-to-end security coverage, the book covers topics in moderate depth. For the reader who wants to delve deeper, each chapter includes extensive bibliographic notes. The reader needs no specific expertise, but familiarity with wireless and mobile concepts is helpful.
Wireless and mobile system architects and developers will learn the basic security principles and technologies that are relevant to their projects. Seniors and graduate students in computer science or information systems will find thorough coverage in a well-organized,readable form.
We believe that all mobile and wireless professionals will find this book interesting and useful. For all other readers, this book can serve as a comprehensive reference and a guide to other literature.
The book has 16 chapters. Chapters 1 through 3 provide an introduction to mobile and wireless security concepts, including authentication, authorization, and cryptographic techniques.
Chapters 4 through 6 describe the security aspects of mobile platforms, including hardware and software security, and the important topic of mobile security certification. Chapters 7 through and 10 are focused on wireless protocols and describe higher layer and IP layer security, including network authentication and authorization from networking and protocol perspectives.
File Type: PDF
File Size: 1.59 MB
Total Pages: 333
Direct Link Mega:
Direct Link AnonFiles:
Direct Link Mediafire:
Direct Link Solidfiles:
Direct Link Sabercathost:
Direct Link Tusfiles: