Logo

Security and Privacy in Wireless and Mobile Networks

Small book cover: Security and Privacy in Wireless and Mobile Networks

Security and Privacy in Wireless and Mobile Networks
by

Publisher: MDPI AG
ISBN-13: 9783038427803
Number of pages: 174

Description:
This special issue has been dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. Particularly, apart from network and link layer security, the focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.

Home page url

Download or read it online for free here:
Download link
(20MB, PDF)

Similar books

Book cover: Information Security in EducationInformation Security in Education
- Wikibooks
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
(6790 views)
Book cover: The Security Development LifecycleThe Security Development Lifecycle
by - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
(2068 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(12142 views)
Book cover: Selected Aspects of Computer Security in Open SystemsSelected Aspects of Computer Security in Open Systems
by - Australian Computer Emergency Response Team
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. An examination of common authentication techniques is provided, including X.509 Strong Authentication and Kerberos.
(5135 views)