This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and...Loe edasi...
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be highly useful for Android malware researchers, developers, students and cyber securi...Loe edasi...
Sari: River Publishers Series in Digital Security and Forensics
(Ilmumisaeg: 21-Dec-2023, Hardback, Kirjastus: River Publishers, ISBN-13: 9788770228619)
This concise guide to mobile crowdsourcing and crowdsensing vulnerabilities and countermeasures walks readers through a series of examples, discussions, tables, initiative figures, and diagrams to present to them security and privacy foundations a...Loe edasi...
Written by machine-learning researchers and members of the Android Security team, this all-star guide tackles the analysis and detection of malware that targets the Android operating system.This comprehensive guide to Android malware i...Loe edasi...
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and d...Loe edasi...
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be highly useful for Android malware researchers, developers, students and cyber securi...Loe edasi...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency...Loe edasi...
Looks at the how and why of mobile platform security, discusses vulnerabilities and attacks, and discusses emerging research that explores ways of dealing with hardware compromise, and building blocks for the next generation of hardware platform sec...Loe edasi...
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each...Loe edasi...
(Ilmumisaeg: 24-Aug-2021, Kit, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284228465)
The world of wireless and mobile devices is evolving rapidly, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securi...Loe edasi...
Most organizations have been caught off-guard with the proliferation of smart devices. The IT organization was comfortable supporting the Blackberry due to its ease of implementation and maintenance. But the use of Android and iOS smart devices ha...Loe edasi...
The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency...Loe edasi...
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is...Loe edasi...
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.0. Furthermore, this book explores how the adoption of these technologies is...Loe edasi...
(Ilmumisaeg: 14-Apr-2021, Paperback / softback, Kirjastus: Jones and Bartlett Publishers, Inc, ISBN-13: 9781284211726)
The world of wireless and mobile devices is evolving rapidly, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securi...Loe edasi...
(Ilmumisaeg: 28-Feb-2021, Hardback, Kirjastus: Business Science Reference, ISBN-13: 9781799885450)
This book includes a variety of contributions that seek to fill the void for an all-encompassing and comprehensive reference book covering the latest and most emerging research, concepts, and theories for preventing, identifying, and mitigating the...Loe edasi...
Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including...Loe edasi...
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each...Loe edasi...
Covering up-to-date mobile platforms, this book focuses on teaching you the most recent tools and techniques for investigating mobile devices. Readers will delve into a variety of mobile forensics techniques for iOS 11-13, Android 8-10 devices, and...Loe edasi...
The MS-101 exam is part of the Microsoft 365 Certified: Enterprise Administrator Expert certification path in which users learn to evaluate, plan, migrate, deploy, and manage Microsoft 365 services. This book offers complete, up-to-date coverage of...Loe edasi...