Securing mobile devices and technology / Kutub Thakur and Al-Sakib Pathan.
Material type: TextEdition: First editionDescription: pages cmISBN: 9781032136110; 9781032136127Subject(s): Mobile communication systems -- Security measuresDDC classification: 005.8/2 LOC classification: TK5102.85 | .T49 2022Summary: "This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners"--Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APU Library Open Shelf | Book | TK5102.85 .T49 2022 c.1 (Browse shelf (Opens below)) | 1 | Available | 00013075 |
Includes bibliographical references and index.
"This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners"--
There are no comments on this title.