Description |
1 online resource (xxv, 409 pages) : illustrations |
Contents |
Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures |
Summary |
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Cell phone systems -- Security measures
|
|
Mobile communication systems -- Security measures
|
|
Mobile computing -- Security measures
|
|
Computer crimes -- Prevention
|
|
Computer crimes -- Case studies
|
|
Hackers.
|
|
Wireless Internet -- Security measures
|
|
COMPUTERS -- Internet -- Security.
|
|
COMPUTERS -- Networking -- Security.
|
|
COMPUTERS -- Security -- General.
|
|
Computer crimes
|
|
Computer crimes -- Prevention
|
|
Hackers
|
Genre/Form |
Case studies
|
Form |
Electronic book
|
Author |
Dunham, Ken.
|
|
Abu-Nimeh, Saeed
|
ISBN |
1597492981 |
|
9781597492980 |
|
9780080949192 |
|
0080949193 |
|