Search Results: 'mobile phone security'

Search

×
×
×
×
7 results for "mobile phone security"
Mobile Security: A Guide for Users By David Rogers
Paperback: $8.25
Ships in 3-5 business days
(1 Ratings)
Mobile device security is something that affects nearly every person in the world. Users are still however, crying out for good information on what they should do to prevent theft, protect their... More > smartphone from attack and for advice that they can use practically to help themselves. This short book sets out to address that. Originally written as a whitepaper for the Police in the UK, it gives some of the history of mobile security and explains the efforts that have gone on behind the scenes in the mobile industry to help secure users. It also provides guidance for users to help protect themselves. The technology in mobile phones is constantly evolving and new threats and attacks emerge on a daily basis. Educating users is one of the most important and valuable things that can be done to help prevent harm. The author brings his extensive experience of the mobile industry and security development for devices to this book in order to help make users safer and more secure.< Less
Mobile Security: A Guide for Users By David Rogers
eBook (ePub): $3.89
Download immediately.
Mobile device security is something that affects nearly every person in the world. Users are still however, crying out for good information on what they should do to prevent theft, protect their... More > smartphone from attack and for advice that they can use practically to help themselves. This short book sets out to address that. Originally written as a whitepaper for the Police in the UK, it gives some of the history of mobile security and explains the efforts that have gone on behind the scenes in the mobile industry to help secure users. It also provides guidance for users to help protect themselves. The technology in mobile phones is constantly evolving and new threats and attacks emerge on a daily basis. Educating users is one of the most important and valuable things that can be done to help prevent harm. The author brings his extensive experience of the mobile industry and security development for devices to this book in order to help make users safer and more secure.< Less
HACKING WITH SMART PHONES By Trishneet Arora
Paperback: List Price: $5.00 $2.50 | You Save: 50%
Ships in 3-5 business days
At a recent event I came across someone who had read both my previous books but was still unable to grasp anything about hacking. The language and tasks discussed in my former books are very complex.... More > He asked me to write something basic that everyone can understand. So, I thought to write about Hacking with a Smartphones, a readily available tool to everyone in this 21st Century. Even a rickshaw driver today who earns hundred rupees a day owns a Smartphone. Understandably,none of us want our data to be hacked by a rickshaw driver, but the tricks and methods in this book have been explained so easily that even they can clench it. With the craze of e-shopping and net banking increasing the rate of cyber crime is increasing too. This book will tell you simple countermeasures about smart phones and digital security, they are simple but dangerous. Note: Don’t expect big hacking techniques through this book, it may disappoint you. #hackinstagram #spyandroidmobile #whatsapphacking #iPhoneHacking< Less
Dyman & Associates Risk Management Projects Norton Mobile Security: app protects Android devices By Jeiy Lui
eBook (PDF): $9.51
Download immediately.
Android is on track to surpass one billion users across all devices in 2014, says the Gartner research and consulting group, but a boost in market share often invites more malware ("malicious... More > software"). Perhaps, then, it's no surprise many Android phone and tablet owners are opting for security software to protect the open source operating system. Tested on a Samsung Galaxy Note 3, I've taken Symantec's new Norton Mobile Security app for a spin, which promises to not only protect your device from viruses and other malware but also locks down your privacy settings, scans memory cards for threats and helps you find your lost or stolen phone.< Less
Introduction to Bluejacking By Homework Help Classof1
eBook (PDF): $1.99
Download immediately.
In this world of technology, there are several new techniques and mechanisms that have made things easier in our lives and have changed the way we carry out different activities. In just a matter of... More > a couple of centuries, humans have developed from rubbing stones and making fire to automate everything. One such technology that has changed our lives in different ways and facilitated several tasks is bluejacking. You must have heard of the term bluetooth, wherein mobile phones and different devices have Bluetooth and they make use of the same for exchanging information.< Less
Remote Debugging and Reflection in Resource Constrained Devices By Nikolaos Papoulias
Paperback: $21.49
Ships in 3-5 business days
Building software for devices that cannot locally support development tools can be challenging. These devices have either limited computing power to run an IDE (smart-phones), lack appropriate... More > input/output interfaces (display, keyboard, mouse) for programming (mobile robots) or are simply unreachable for local development (cloud-servers). Yet remote debugging solutions can prove awkward to use due to their distributed nature. Empirical studies show us that on average 10.5 minutes per coding hour are spend for re-deploying applications. Moreover current solutions lack facilities that would otherwise be available in a local setting. In this dissertation in order to overcome these issues we first identify four desirable properties that an ideal solution for remote debugging should exhibit, namely: interactiveness, instrumentation, distribution and security. Given these properties we propose Mercury, a remote debugging model and architecture for reflective OO languages.< Less
The Axis Telecom Capital Group Indonesia Jakarta Globe News By Matthias Hahn
eBook (PDF): $9.65
Download immediately.
Ministry Approves XL Axiata-Axis Telekom Merger XL Axiata, Indonesia’s third largest mobile phone operator, has secured official approval from the Ministry of Communications and Information... More > Technology to acquire Axis Telekom Indonesia, the company’s chief confirmed on Friday. Malaysia’s Axiata Group, which has a 66.5 percent stake in XL Axiata, has reportedly offered to acquire Axis Telecom, which is 84 percent controlled by Saudi Telecom Company. The merger is said to give the Indonesian operator access to the mobile-phone frequencies it requires to expand in the competitive Indonesian market. “We have received a letter of approval from the Ministry of Communications and Information,” said Hasnul Suhaimi, the president director of XL Axiata on Friday.< Less