Mobile Phone Security and Forensics A Practical Approach
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book.
- PDF / 4,824,826 Bytes
- 128 Pages / 439.42 x 683.15 pts Page_size
- 13 Downloads / 286 Views
Mobile Phone Security and Forensics A Practical Approach Second Edition
Mobile Phone Security and Forensics
Iosif I. Androulidakis
Mobile Phone Security and Forensics A Practical Approach Second Edition
Iosif I. Androulidakis Pedini Ioannina Greece
ISBN 978-3-319-29741-5 ISBN 978-3-319-29742-2 DOI 10.1007/978-3-319-29742-2
(eBook)
Library of Congress Control Number: 2016931614 © Springer International Publishing Switzerland 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG Switzerland
To my parents
Preface
Welcome to the second edition of “Mobile Phone Security and Forensics.” The dominance of mobile phones has continued since the publication of the first version of the book, in an ever-increasing rate. However, while we are enjoying the technological advances that mobile phones offer, we are also facing new security risks coming as a cost of our increasing dependence on the benefits of wireless communications. The purpose of this book is the same as before: to raise user awareness in regard to security and privacy threats present in the use of mobile phones. It is focused on practical issues and easy to follow examples, skipping theoretical analysis of algorithms and standards. Most sections have been enriched with new material. The book is more geared toward the mobile devices themselves and not the underlying networks, so most of the contents are applicable irrespectively of the “generation” of the network (GSM, 3G, 4G, etc.) to GSM and UMTS alike. The goal is to achieve a balance, including both technical and nontechnical chapters. Amateurs as well as experienced users will benefit from the overview of threats and the valuable practical advice. They will also get to know various tricks affecting the security of their phone. More advanced users will appreciate the technical discussions and will possibly try experimenti
Data Loading...