Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
204
result(s) for
"Mobile computing -- Security measures"
Sort by:
Privacy in mobile and pervasive computing
It is easy to imagine that a future populated with an ever-increasing number of mobile and pervasive devices that record our minute goings and doings will significantly expand the amount of information that will be collected, stored, processed, and shared about us by both corporations and governments. The vast majority of this data is likely to benefit us greatly--making our lives more convenient, efficient, and safer through custom-tailored and context-aware services that anticipate what we need, where we need it, and when we need it. But beneath all this convenience, efficiency, and safety lurks the risk of losing control and awareness of what is known about us in the many different contexts of our lives. Eventually, we may find ourselves in a situation where something we said or did will be misinterpreted and held against us, even if the activities were perfectly innocuous at the time. Even more concerning, privacy implications rarely manifest as an explicit, tangible harm. Instead, most privacy harms manifest as an absence of opportunity, which may go unnoticed even though it may substantially impact our lives. In this Synthesis Lecture, we dissect and discuss the privacy implications of mobile and pervasive computing technology. For this purpose, we not only look at how mobile and pervasive computing technology affects our expectations of--and ability to enjoy--privacy, but also look at what constitutes \"privacy\" in the first place, and why we should care about maintaining it. We describe key characteristics of mobile and pervasive computing technology and how those characteristics lead to privacy implications. We discuss seven approaches that can help support end-user privacy in the design of mobile and pervasive computing technologies, and set forward six challenges that will need to be addressed by future research. The prime target audience of this lecture is researchers and practitioners working in mobile and pervasive computing who want to better understand and account for the nuanced privacy implications of the technologies they are creating. Those new to either mobile and pervasive computing or privacy may also benefit from reading this book to gain an overview and deeper understanding of this highly interdisciplinary and dynamic field.
Software Test Attacks to Break Mobile and Embedded Devices
by
Hagar, Jon Duncan
in
Computer programming, programs, data
,
Embedded computer systems
,
Mobile computing
2013,2014,2015
This book presents an attack basis for testing mobile and embedded systems in \"smart\" devices. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It illustrates how to apply both traditional and new approaches. For those working with mobile/embedded systems without an extensive background in testing, the book brings together testing ideas, techniques, and solutions that are immediately applicable to testing smart and mobile devices.
Android Forensics
by
Hoog, Andrew
in
Android (Electronic resource)
,
Computer crimes
,
Data recovery (Computer science)
2011
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android examines the Android mobile platform and shares techniques for the forensic acquisition and subsequent analysis of Android devices. Organized into seven chapters, the book looks at the history of the Android platform and its internationalization; it discusses the Android Open Source Project (AOSP) and the Android Market; it offers a brief tutorial on Linux and Android forensics; and it explains how to create an Ubuntu-based virtual machine (VM). The book also considers a wide array of Android-supported hardware and device types, the various Android releases, the Android software development kit (SDK), the Davlik VM, key components of Android security, and other fundamental concepts related to Android forensics, such as the Android debug bridge and the USB debugging setting. In addition, it analyzes how data are stored on an Android device and describes strategies and specific utilities that a forensic analyst or security engineer can use to analyze an acquired Android device. Core Android developers and manufacturers, app developers, corporate security officers, and anyone with limited forensic experience will find this book extremely useful. Named a 2011 Best Digital Forensics Book by InfoSec ReviewsAbility to forensically acquire Android devices using the techniques outlined in the bookDetailed information about Android applications needed for forensics investigationsImportant information about SQLite, a file based structured data storage relevant for both Android and many other platforms.
Security management in mobile cloud computing
\"This book explores the difficulties and challenges of securing user data and information on mobile cloud platforms, investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms\"-- Provided by publisher.
Practical Mobile Forensics
by
Mahalik, Heather
,
Bommisetty, Satish
in
Cell phone systems
,
Cell phone systems-Security measures
,
COM053000 COMPUTERS / Security / General
2018
Mobile phone forensics is the science of retrieving data from a mobile phone under forensically sound conditions. This book is an update to Practical Mobile Forensics, Second Edition and it delves into the concepts of mobile forensics and its importance in today's world.
iOS application security : the definitive guide for hackers and developers
\"Covers fundamentals of iOS security and application development including the basics of Objective-C, white and black box testing, how to eliminate data leaks, and iOS penetration testing and evaluation. Includes coverage of iOS 8\"-- Provided by publisher.
Android security internals : an in-depth guide to Android's security architecture
by
Elenkov, Nikolay
in
Android (Electronic resource)
,
Mobile computing
,
Mobile computing -- Security measures
2015,2014
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionalsuntil now.In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.Youll learn:How Android permissions are declared, used, and enforcedHow Android manages application packages and employs code signing to verify their authenticityHow Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworksAbout Androids credential storage system and APIs, which let applications store cryptographic keys securelyAbout the online account management framework and how Google accounts integrate with AndroidAbout the implementation of verified boot, disk encryption, lockscreen, and other device security featuresHow Androids bootloader and recovery OS are used to perform full system updates, and how to obtain root accessWith its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.
Mobile Security
2009
This pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone. Written by one of the country’s top academic experts on information security, the guide covers such topics as safeguarding data through encryption, establishing a virtual private network (VPN) to create a secure way for your staff to connect to the server on a remote device, and countering the growing threat on mobile platforms of SMS-phishing and malware. Rather than trying to ban the Blackberry, the solution proposed is for organisations to factor mobile devices into their overall information security policy. The recommendations contained in this pocket guide are designed to enable your organisation to enjoy the benefits of mobile phones and personal digital assistants (PDAs) without sacrificing the ability to operate as safely and securely as possible.