2nd edition. — Springer, 2016. — 128 p. — ISBN 978-3-319-29742-2.The purpose of this book is the same as before: to raise user awareness in regard to security and privacy threats present in the use of mobile phones. It is focused on practical issues and easy to follow examples, skipping theoretical analysis of algorithms and standards. Most sections have been enriched with new material. The book is more geared toward the mobile devices themselves and not the underlying networks, so most of the contents are applicable irrespectively of the “generation” of the network (GSM, 3G, 4G, etc.) to GSM and UMTS alike. The goal is to achieve a balance, including both technical and nontechnical chapters. Amateurs as well as experienced users will benefi t from the overview of threats and the valuable practical advice. They will also get to know various tricks affecting the security of their phone. More advanced users will appreciate the technical discussions and will possibly try experimenting with the forensics and mobile phone control techniques presented in the respective chapters.
Чтобы скачать этот файл зарегистрируйтесь и/или войдите на сайт используя форму сверху.