Mobile Security

Hacking Exposed Mobile: Security Secrets & Solutions  eBooks & eLearning

Posted by Grev27 at June 24, 2014
Hacking Exposed Mobile: Security Secrets & Solutions

Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse, "Hacking Exposed Mobile: Security Secrets & Solutions"
English | ISBN: 0071817018 | 2013 | PDF, EPUB | 320 pages | 6 MB, 13 MB

Automated Mobile Application Security Assessment with MobSF  eBooks & eLearning

Posted by C2U at Jan. 14, 2016
Automated Mobile Application Security Assessment with MobSF

Automated Mobile Application Security Assessment with MobSF
1 hours | Video: h264, yuv420p, 1280x720 30fps | Audio: aac, 44100 Hz, 2 ch | 225 MB
Genre: eLearning | Language: English

This course introduces Mobile Security Framework (MobSF) which automates your Mobile Application Security Assessments.

Data Privacy Management and Autonomous Spontaneous Security  eBooks & eLearning

Posted by tanas.olesya at May 12, 2016
Data Privacy Management and Autonomous Spontaneous Security

Data Privacy Management and Autonomous Spontaneous Security (Lecture Notes in Computer Science) by Joaquin Garcia-Alfaro
English | Mar. 21, 2014 | ISBN: 364254567X | 400 Pages | PDF | 10 MB

The papers cover topics related to the management of privacy-sensitive information and automated configuration of security, focusing in particular on system-level privacy policies, administration of sensitive identifiers, data integration and privacy, engineering authentication and authorization, mobile security and vulnerabilities.

Information Security Applications  eBooks & eLearning

Posted by johinson at April 30, 2010
Information Security Applications

Kim Sehun, Moti Yung, «Information Security Applications»
Springer | ISBN: 354077534X | 2008 | PDF | 388 pages | 9.4 MB

This book constitutes the refereed proceedings of the 8th International Workshop on Information Security Applications, WISA 2007, held in Jeju Island, Korea, August 27-29, 2007. The 27 revised full papers presented were carefully selected during two rounds of reviewing and improvement from 95 submissions. The papers are organized in topical sections on Public Key Crypto Applications, Biometrics/Information Hiding, Secure Hardware, Secure Systems, Wireless and Mobile Security, Application Security/Secure Systems, Access Control/DB Security, Smart Cards/Secure Systems and Anonymity and P2P Security.

Information Security and Cryptology  eBooks & eLearning

Posted by spmspm at Nov. 20, 2009
Information Security and Cryptology

Information Security and Cryptology – ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers (Lecture Notes in Computer Science)
Springer | Jong In Lim, Dong Hoon Lee | Englisch | Pages: 458 | 2004 | ISBN 3540213767 | PDF | 25 MB

This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited paper were carefully selected from 163 submissions during two rounds of reviewing and improvement. The papers are organized in topical sections on digital signatures, primitives, fast implementations, computer security and mobile security, voting and auction protocols, watermarking, authentication and threshold protocols, and block ciphers and stream ciphers.

Security and Privacy for Mobile Healthcare Networks (Repost)  eBooks & eLearning

Posted by insetes at Dec. 5, 2016
Security and Privacy for Mobile Healthcare Networks (Repost)

Security and Privacy for Mobile Healthcare Networks By Kuan Zhang, Xuemin (Sherman) Shen
2015 | 134 Pages | ISBN: 3319247158 | PDF | 3 MB

Mobile and Wireless Network Security and Privacy [Repost]  eBooks & eLearning

Posted by tanas.olesya at Nov. 27, 2016
Mobile and Wireless Network Security and Privacy [Repost]

Mobile and Wireless Network Security and Privacy by S. Kami Makki
English | 10 July 2007 | ISBN: 0387710574 | 232 Pages | PDF | 11 MB

This book brings together a number of papers that represent seminal contributions underlying mobile and wireless network security and privacy. It provides a foundation for implementation and standardization as well as further research.

Coursera - Information Security and Risk Management in Context [repost]  eBooks & eLearning

Posted by ParRus at Nov. 20, 2016
Coursera - Information Security and Risk Management in Context [repost]

Coursera - Information Security and Risk Management in Context
University of Washington with Barbara Endicott-Popovsky

WEBRip | English | MP4 | 960 x 540 | AVC ~456 kbps | 29.970 fps
AAC | 128 Kbps | 44.1 KHz | 2 channels | Subs: English (.srt) | 16:43:29 | 2.54 GB
Genre: eLearning Video / Information Technology, Security

Explore the latest techniques for securing information and its systems, from policies and procedures to technologies and audit. Learn from leading experts who share proven practices in areas such as mobile workforce safety, security metrics, electronic evidence oversight and coping with e-crime and e-discovery. Study the protection of Cloud computing information. Discover how to foster the development of future information security leaders.
Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications

Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications by Yan Zhang
English | 2 Sept. 2008 | ISBN: 1420055372 | 424 Pages | PDF | 10 MB

The goal of Unlicensed Mobile Access (UMA) is to provide seamless access to GSM and GPRS mobile service networks via unlicensed spectrum technologies, including Bluetooth, WiMAX, and Wi-Fi. Expanding on the level of knowledge in this growing field, Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards, and Applications presents the first complete cross-referenced resource exploring UMA and UMA-relevant technologies.

Wireless Security Essentials: Defending Mobile Systems from Data Piracy (Repost)  eBooks & eLearning

Posted by step778 at Sept. 20, 2016
Wireless Security Essentials: Defending Mobile Systems from Data Piracy (Repost)

Russell Dean Vines, "Wireless Security Essentials: Defending Mobile Systems from Data Piracy"
2002 | pages: 369 | ISBN: 0471209368 | PDF | 6,1 mb