Description |
1 online resource (xxxiii, 612 pages) : illustrations |
Contents |
Section I: Basic Techniques for Mobile Communications and Security -- Threats, Hacking, and Viruses in Mobile Communications -- Access Control and Authentication in Mobile Communications -- Common Techniques for Mobile Communications Security -- Smart Card Security: The SIM/USIM Case -- Section II: Attack and Protection Techniques in Mobile Communication Networks -- Security of GSM Networks -- Security of 3G Networks -- Wireless Local Area Network Security -- Security of Ad Hoc Networks -- Section III: Security of Network-Based Services in Mobile Communications -- Inter-System Roaming and Internetworking Security -- Securing Mobile Services -- Security of Mobile Sensor Networks -- Security of Satellite Services -- Section IV: Protection Techniques for Mobile Applications -- Security of Mobile Payments -- Security of Mobile Voice Communications -- Security of Multimedia Communications |
Summary |
Covers the complex security issues that face the mobile communications industry. This book discusses hacking and infecting with viruses; techniques used to provide access control, authentication, and authorization; the security of SIM-like cards; and, standards implemented by the GSM, third generation, WLAN, and ad-hoc networks |
Notes |
"An Auerbach book." |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Mobile communication systems -- Security measures
|
|
Wireless communication systems -- Security measures
|
|
Mobile computing -- Security measures
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
TECHNOLOGY & ENGINEERING -- Electrical.
|
|
COMPUTERS -- Security -- General.
|
|
Wireless communication systems -- Security measures
|
Form |
Electronic book
|
ISBN |
9780849379420 |
|
0849379423 |
|