With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats.
About the Author
Selim Aissi is manager and chief architect of manageability and security at Intel Corporation’s Mobile Platform Group. He attended the University of Michigan, where he earned his M.S. and Ph.D. in aerospace engineering. He is a Certified Information Systems Security Professional (CISSP), Senior Member of IEEE, and had served on the editorial and technical boards of several journals and conferences.
AnandR. Prasad is a senior researcher at DoCoMo Euro-Labs, Munich, Germany. A senior member of the IEEE, he earned his Ph.D. for studies on IP-based WLANs: protocols, security and deployment at Delft University of Technology, The Netherlands.
Nora Dabbous is a security architect for Gemplus, Suresnes, France, where she researches such security technologies as biometrics and smart cards. She earned an M.S. in telecommunications engineering from the University of Bologna, Italy.
Alfresco 3 Records Management
This book is structured in a sequential way that walks you through the steps necessary to set up your Alfresco Records Management system. Chapters follow a logical progression with each chapter building on the knowledge and implementation details learned in earlier chapters. If you are a records manager, business analyst, or a software...
Practical PostgreSQL (O'Reilly Unix)
PostgreSQL is one of the most successful open source databases available. It is arguably also the most advanced, with a wide range of features that challenge even many closed-source databases.
This book is intended to be a practical guide to PostgreSQL v7.1.x, though most of the book should also apply to earlier and future releases of...
Nuclear Energy: Principles, Practices, and Prospects "The material presented here is largely accessible to anyone interested in nuclear energy. This book is the best of its kind in providing a well-written survey of the science, technology, safety, and economics of the full range of nuclear issues, including power, waste, weapons, terrorism, biological effects, and the future of the nuclear...
Runic Amulets and Magic Objects
The runic alphabet, in use for well over a thousand years, was employed by various Germanic groups in a variety of ways, including, inevitably, for superstitious and magical rites. Formulaic runic words were inscribed onto small items that could be carried for good luck; runic charms were carved on metal or wooden amulets to ensure peace or...