The book begins with an introduction to mobile security, laying the foundation by defining key terms and concepts that underpin this area of technology. It then navigates through the multi-layered facets of mobile security, discussing the security of mobile devices, networks, applications, and data. In addition to discussing these pillars of mobile security, the book provides realistic examples of potential security threats, vulnerabilities, and common exploits.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, CY, CZ, D, DK, EW, E, FIN, F, GR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.