Mobile phone security and forensics: a practical approach
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Cham]
Springer
[2016]
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | BTU01 FAB01 FAW01 FHA01 FHI01 FHN01 FHR01 FKE01 FRO01 FWS01 FWS02 UBY01 URL des Erstveröffentlichers Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (xi, 120 Seiten) |
ISBN: | 9783319297422 |
DOI: | 10.1007/978-3-319-29742-2 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043504169 | ||
003 | DE-604 | ||
005 | 20160912 | ||
007 | cr|uuu---uuuuu | ||
008 | 160411s2016 |||| o||u| ||||||eng d | ||
020 | |a 9783319297422 |c Online |9 978-3-319-29742-2 | ||
024 | 7 | |a 10.1007/978-3-319-29742-2 |2 doi | |
035 | |a (ZDB-2-ENG)978-3-319-29742-2 | ||
035 | |a (OCoLC)946154731 | ||
035 | |a (DE-599)BVBBV043504169 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-1046 |a DE-1043 |a DE-Aug4 |a DE-898 |a DE-861 |a DE-573 |a DE-859 |a DE-863 |a DE-634 |a DE-862 |a DE-92 | ||
082 | 0 | |a 621.382 |2 23 | |
100 | 1 | |a Androulidakis, Iosif I. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile phone security and forensics |b a practical approach |c Iosif I. Androulidakis |
250 | |a Second edition | ||
264 | 1 | |a [Cham] |b Springer |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource (xi, 120 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Engineering | |
650 | 4 | |a Forensic science | |
650 | 4 | |a Computer security | |
650 | 4 | |a System safety | |
650 | 4 | |a Electrical engineering | |
650 | 4 | |a Communications Engineering, Networks | |
650 | 4 | |a Systems and Data Security | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Forensic Science | |
650 | 4 | |a Ingenieurwissenschaften | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-29741-5 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-29742-2 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920514&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920514&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-ENG | ||
940 | 1 | |q ZDB-2-ENG_2016 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-028920514 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l BTU01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FAB01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FAW01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FHA01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FHI01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FHN01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FHR01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FKE01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FRO01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FWS01 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l FWS02 |p ZDB-2-ENG |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-29742-2 |l UBY01 |p ZDB-2-ENG |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 615588 |
---|---|
_version_ | 1824554518102147072 |
adam_text | MOBILE PHONE SECURITY AND FORENSICS
/ ANDROULIDAKIS, IOSIF I.
: 2016
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION: CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY THREATS IN
MOBILE PHONES
A MULTINATIONAL SURVEY ON USER S PRACTICES, PERCEPTIONS, AND AWARENESS
REGARDING MOBILE PHONE SECURITY
VOICE, SMS, AND IDENTIFICATION DATA INTERCEPTION IN GSM
SOFTWARE AND HARDWARE MOBILE PHONE TRICKS
SMS SECURITY ISSUES
MOBILE PHONE FORENSICS
CONCLUSION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
MOBILE PHONE SECURITY AND FORENSICS
/ ANDROULIDAKIS, IOSIF I.
: 2016
ABSTRACT / INHALTSTEXT
THIS NEW EDITION PROVIDES BOTH THEORETICAL AND PRACTICAL BACKGROUND OF
SECURITY AND FORENSICS FOR MOBILE PHONES. THE AUTHOR DISCUSSES
CONFIDENTIALITY, INTEGRITY, AND AVAILABILITY THREATS IN MOBILE
TELEPHONES TO PROVIDE BACKGROUND FOR THE REST OF THE BOOK. SECURITY AND
SECRETS OF MOBILE PHONES ARE DISCUSSED INCLUDING SOFTWARE AND HARDWARE
INTERCEPTION, FRAUD AND OTHER MALICIOUS TECHNIQUES USED “AGAINST”
USERS. THE PURPOSE OF THIS BOOK IS TO RAISE USER AWARENESS IN REGARDS TO
SECURITY AND PRIVACY THREATS PRESENT IN THE USE OF MOBILE PHONES WHILE
READERS WILL ALSO LEARN WHERE FORENSICS DATA RESIDE IN THE MOBILE PHONE
AND THE NETWORK AND HOW TO CONDUCT A RELEVANT ANALYSIS. THE INFORMATION
ON DENIAL OF SERVICE ATTACKS HAS BEEN THOROUGHLY UPDATED FOR THE NEW
EDITION. ALSO, A MAJOR ADDITION TO THIS EDITION IS A SECTION DISCUSSING
SOFTWARE DEFINED RADIO AND OPEN SOURCE TOOLS FOR MOBILE PHONES
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Androulidakis, Iosif I. |
author_facet | Androulidakis, Iosif I. |
author_role | aut |
author_sort | Androulidakis, Iosif I. |
author_variant | i i a ii iia |
building | Verbundindex |
bvnumber | BV043504169 |
collection | ZDB-2-ENG |
ctrlnum | (ZDB-2-ENG)978-3-319-29742-2 (OCoLC)946154731 (DE-599)BVBBV043504169 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
doi_str_mv | 10.1007/978-3-319-29742-2 |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03282nmm a2200649zc 4500</leader><controlfield tag="001">BV043504169</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160912 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160411s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319297422</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-29742-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-29742-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-ENG)978-3-319-29742-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)946154731</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043504169</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-1046</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Androulidakis, Iosif I.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile phone security and forensics</subfield><subfield code="b">a practical approach</subfield><subfield code="c">Iosif I. Androulidakis</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Cham]</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xi, 120 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">System safety</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Communications Engineering, Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensic Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ingenieurwissenschaften</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-29741-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920514&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920514&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-ENG</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-ENG_2016</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028920514</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FAB01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-29742-2</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-ENG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043504169 |
illustrated | Not Illustrated |
indexdate | 2025-02-20T06:53:02Z |
institution | BVB |
isbn | 9783319297422 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028920514 |
oclc_num | 946154731 |
open_access_boolean | |
owner | DE-706 DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-862 DE-BY-FWS DE-92 |
owner_facet | DE-706 DE-1046 DE-1043 DE-Aug4 DE-898 DE-BY-UBR DE-861 DE-573 DE-859 DE-863 DE-BY-FWS DE-634 DE-862 DE-BY-FWS DE-92 |
physical | 1 Online-Ressource (xi, 120 Seiten) |
psigel | ZDB-2-ENG ZDB-2-ENG_2016 |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Springer |
record_format | marc |
spellingShingle | Androulidakis, Iosif I. Mobile phone security and forensics a practical approach Engineering Forensic science Computer security System safety Electrical engineering Communications Engineering, Networks Systems and Data Security Security Science and Technology Forensic Science Ingenieurwissenschaften |
title | Mobile phone security and forensics a practical approach |
title_auth | Mobile phone security and forensics a practical approach |
title_exact_search | Mobile phone security and forensics a practical approach |
title_full | Mobile phone security and forensics a practical approach Iosif I. Androulidakis |
title_fullStr | Mobile phone security and forensics a practical approach Iosif I. Androulidakis |
title_full_unstemmed | Mobile phone security and forensics a practical approach Iosif I. Androulidakis |
title_short | Mobile phone security and forensics |
title_sort | mobile phone security and forensics a practical approach |
title_sub | a practical approach |
topic | Engineering Forensic science Computer security System safety Electrical engineering Communications Engineering, Networks Systems and Data Security Security Science and Technology Forensic Science Ingenieurwissenschaften |
topic_facet | Engineering Forensic science Computer security System safety Electrical engineering Communications Engineering, Networks Systems and Data Security Security Science and Technology Forensic Science Ingenieurwissenschaften |
url | https://doi.org/10.1007/978-3-319-29742-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920514&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=028920514&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT androulidakisiosifi mobilephonesecurityandforensicsapracticalapproach |