000 03185nam a22005415i 4500
001 978-3-319-29742-2
003 DE-He213
005 20220801222345.0
007 cr nn 008mamaa
008 160322s2016 sz | s |||| 0|eng d
020 _a9783319297422
_9978-3-319-29742-2
024 7 _a10.1007/978-3-319-29742-2
_2doi
050 4 _aTK5101-5105.9
072 7 _aTJK
_2bicssc
072 7 _aTEC041000
_2bisacsh
072 7 _aTJK
_2thema
082 0 4 _a621.382
_223
100 1 _aAndroulidakis, Iosif I.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_961056
245 1 0 _aMobile Phone Security and Forensics
_h[electronic resource] :
_bA Practical Approach /
_cby Iosif I. Androulidakis.
250 _a2nd ed. 2016.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2016.
300 _aXI, 120 p. 47 illus., 34 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 _aIntroduction: Confidentiality, Integrity, and Availability Threats in Mobile Phones -- A Multinational Survey on User's Practices, Perceptions, and Awareness Regarding Mobile Phone Security -- Voice, SMS, and Identification Data Interception in GSM -- Software and Hardware Mobile Phone Tricks -- SMS Security Issues -- Mobile Phone Forensics -- Conclusion.
520 _aThis new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
650 0 _aTelecommunication.
_910437
650 0 _aData protection.
_97245
650 0 _aSecurity systems.
_931879
650 0 _aForensic sciences.
_96191
650 1 4 _aCommunications Engineering, Networks.
_931570
650 2 4 _aData and Information Security.
_931990
650 2 4 _aSecurity Science and Technology.
_931884
650 2 4 _aForensic Science.
_934969
710 2 _aSpringerLink (Online service)
_961057
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783319297415
776 0 8 _iPrinted edition:
_z9783319297439
776 0 8 _iPrinted edition:
_z9783319806419
856 4 0 _uhttps://doi.org/10.1007/978-3-319-29742-2
912 _aZDB-2-ENG
912 _aZDB-2-SXE
942 _cEBK
999 _c80680
_d80680