51,95 €
51,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
51,95 €
Als Download kaufen
51,95 €
inkl. MwSt.
Sofort per Download lieferbar
26 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
51,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
26 °P sammeln
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 7.38MB
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 276
- Erscheinungstermin: 16. Dezember 2021
- Englisch
- ISBN-13: 9781000487275
- Artikelnr.: 62765635
- Verlag: Taylor & Francis
- Seitenzahl: 276
- Erscheinungstermin: 16. Dezember 2021
- Englisch
- ISBN-13: 9781000487275
- Artikelnr.: 62765635
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Kutub Thakur is an assistant professor of cyber security and leads NJCU's cyber security program. Kutub teaches Cyber Security and Forensics at the undergraduate and graduate levels. Kutub is certified in computer hacking and forensic investigation. He worked for various private and public entities such as Lehman Brothers, Barclays Capital, ConEdison, United Nations and Metropolitan Transport Authority. Kutub has various publications in IEEE, I-manager's Journal, Application and Theory of Computer Technology, and the International Journal for Engineering and Technology. He has presented at the IEEE International Conference on High Performance and Smart Computing, IEEE 2nd International Conference on Cyber Security and Cloud Computing and IEEE International Conference on Big Data Security on Cloud. Kutub is an active member of infraGrad (FBI), Homeland Security Information Network, and Research Education Network Information Sharing Analysis Center and Institute of Electrical and Electronics Engineers. Kutub research interests includes Cyber security, forensics and machine learning. Kutub holds a Ph.D. in Computer Science from Pace University. He is also author of the book "Cybersecurity Fundamentals: A Real-World Perspective" published by CRC Press.
Al-Sakib Khan Pathan is a Professor of Computer Science and Engineering. Currently, he is with the Independent University, Bangladesh as an Adjunct Professor. He received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. In his academic career so far, he worked as a faculty member at the CSE Department of Southeast University, Bangladesh during 2015-2020, Computer Science department, International Islamic University Malaysia (IIUM), Malaysia during 2010-2015; at BRACU, Bangladesh during 2009-2010, and at NSU, Bangladesh during 2004-2005. He was a Guest Lecturer for the STEP project at the Department of Technical and Vocational Education, Islamic University of Technology, Bangladesh in 2018. He also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009 where he completed his MS leading to PhD. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has several notable publications in these areas. So far, he has delivered over 22 Keynotes and Invited speeches at various international conferences and events. He has served as a General Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous top-ranked international conferences/workshops like INFOCOM, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, SGIoT, etc. He was awarded the IEEE Outstanding Leadership Award for his role in IEEE GreenCom'13 conference. He is currently serving as the Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, UK, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, International Journal of Sensor Networks, Inderscience Publishers, and Malaysian Journal of Computer Science, Associate Editor of Connection Science, Taylor & Francis, UK, International Journal of Computational Science and Engineering, Inderscience, Area Editor of International Journal of Communication Networks and Information Security, Guest Editor of many special issues of top-ranked journals, and Editor/Author of 22 books. One of his books has been included twice in Intel Corporation's Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, several other books were indexed with all the titles (chapters) in Elsevier's acclaimed abstract and citation database, Scopus, in February 2015, at least one has been approved as a textbook at NJCU, USA in 2020, and one book has been translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper were included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of many prestigious journals. He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT several times; Elsevier Outstanding Reviewer for Computer Networks, Ad Hoc Networks, FGCS, and JNCA in multiple years. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.
Al-Sakib Khan Pathan is a Professor of Computer Science and Engineering. Currently, he is with the Independent University, Bangladesh as an Adjunct Professor. He received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. In his academic career so far, he worked as a faculty member at the CSE Department of Southeast University, Bangladesh during 2015-2020, Computer Science department, International Islamic University Malaysia (IIUM), Malaysia during 2010-2015; at BRACU, Bangladesh during 2009-2010, and at NSU, Bangladesh during 2004-2005. He was a Guest Lecturer for the STEP project at the Department of Technical and Vocational Education, Islamic University of Technology, Bangladesh in 2018. He also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009 where he completed his MS leading to PhD. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has several notable publications in these areas. So far, he has delivered over 22 Keynotes and Invited speeches at various international conferences and events. He has served as a General Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous top-ranked international conferences/workshops like INFOCOM, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, SGIoT, etc. He was awarded the IEEE Outstanding Leadership Award for his role in IEEE GreenCom'13 conference. He is currently serving as the Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, UK, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, International Journal of Sensor Networks, Inderscience Publishers, and Malaysian Journal of Computer Science, Associate Editor of Connection Science, Taylor & Francis, UK, International Journal of Computational Science and Engineering, Inderscience, Area Editor of International Journal of Communication Networks and Information Security, Guest Editor of many special issues of top-ranked journals, and Editor/Author of 22 books. One of his books has been included twice in Intel Corporation's Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, several other books were indexed with all the titles (chapters) in Elsevier's acclaimed abstract and citation database, Scopus, in February 2015, at least one has been approved as a textbook at NJCU, USA in 2020, and one book has been translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper were included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of many prestigious journals. He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT several times; Elsevier Outstanding Reviewer for Computer Networks, Ad Hoc Networks, FGCS, and JNCA in multiple years. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.
1. The Evolution of Data Communication Networks
2. History of Cellular Technology
3. Role of Mobile Technology in Modern World
4. Mobile Security in Perspective
5. Working Principle of Major Wireless Networks
6. Working Principle of Cellular Network
7. Types of Mobile Security Threats
8. Mobile Security Threats in Internet of Things Ecosystem
9. How to Secure Your Mobile Devices?
10. Mobile Password Management
11. Securing Wireless Network Communication
12. Secure Shopping through Mobiles
13. World of Mobile Apps: Security Threats & Solutions
14. Mobile Wireless Technology & Security Standards
Bibliography
Index
2. History of Cellular Technology
3. Role of Mobile Technology in Modern World
4. Mobile Security in Perspective
5. Working Principle of Major Wireless Networks
6. Working Principle of Cellular Network
7. Types of Mobile Security Threats
8. Mobile Security Threats in Internet of Things Ecosystem
9. How to Secure Your Mobile Devices?
10. Mobile Password Management
11. Securing Wireless Network Communication
12. Secure Shopping through Mobiles
13. World of Mobile Apps: Security Threats & Solutions
14. Mobile Wireless Technology & Security Standards
Bibliography
Index
1. The Evolution of Data Communication Networks
2. History of Cellular Technology
3. Role of Mobile Technology in Modern World
4. Mobile Security in Perspective
5. Working Principle of Major Wireless Networks
6. Working Principle of Cellular Network
7. Types of Mobile Security Threats
8. Mobile Security Threats in Internet of Things Ecosystem
9. How to Secure Your Mobile Devices?
10. Mobile Password Management
11. Securing Wireless Network Communication
12. Secure Shopping through Mobiles
13. World of Mobile Apps: Security Threats & Solutions
14. Mobile Wireless Technology & Security Standards
Bibliography
Index
2. History of Cellular Technology
3. Role of Mobile Technology in Modern World
4. Mobile Security in Perspective
5. Working Principle of Major Wireless Networks
6. Working Principle of Cellular Network
7. Types of Mobile Security Threats
8. Mobile Security Threats in Internet of Things Ecosystem
9. How to Secure Your Mobile Devices?
10. Mobile Password Management
11. Securing Wireless Network Communication
12. Secure Shopping through Mobiles
13. World of Mobile Apps: Security Threats & Solutions
14. Mobile Wireless Technology & Security Standards
Bibliography
Index