0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Mobile Platform Security (Paperback): N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, Elena... Mobile Platform Security (Paperback)
N. Asokan, Lucas Davi, Alexandra Dmitrienko, Stephan Heuser, Kari Kostiainen, …
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model illustrates commonly used security mechanisms and techniques in mobile devices and allows a systematic comparison of different platforms. We analyze several mobile platforms using the model. In addition, this book explains hardware-security mechanisms typically present in a mobile device. We also discuss enterprise security extensions for mobile platforms and survey recent research in the area of mobile platform security. The objective of this book is to provide a comprehensive overview of the current status of mobile platform security for students, researchers, and practitioners.

Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings... Trust and Trustworthy Computing - 6th International Conference, TRUST 2013, London, UK, June 17-19, 2013, Proceedings (Paperback, 2013 ed.)
Michael Huth, N. Asokan, Srdjan Capkun, Ivan Flechais, Lizzie Coles-Kemp
R1,413 Discovery Miles 14 130 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 6th International Conference on Trust and Trustworthy Computing, TRUST 2013, held in London, UK, in June 2013. There is a technical and a socio-economic track. The full papers presented, 14 and 5 respectively, were carefully reviewed from 39 in the technical track and 14 in the socio-economic track. Also included are 5 abstracts describing ongoing research. On the technical track the papers deal with issues such as key management, hypervisor usage, information flow analysis, trust in network measurement, random number generators, case studies that evaluate trust-based methods in practice, simulation environments for trusted platform modules, trust in applications running on mobile devices, trust across platform. Papers on the socio-economic track investigated, how trust is managed and perceived in online environments, and how the disclosure of personal data is perceived; and some papers probed trust issues across generations of users and for groups with special needs.

Hardware Platform Security for Mobile Devices (Paperback): Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand,... Hardware Platform Security for Mobile Devices (Paperback)
Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, …
R2,339 Discovery Miles 23 390 Ships in 10 - 15 working days

Personal mobile devices like smartphones and tablets are ubiquitous. People use mobile devices for fun, for work, and for organizing and managing their lives, including their finances. This has become possible because over the past two decades, mobile phones evolved from closed platforms intended for voice calls and messaging to open platforms whose functionality can be extended in myriad ways by third party developers. Such wide-ranging scope of use also means widely different security and privacy requirements for those uses. As mobile platforms gradually opened, platform security mechanisms were incorporated into their architectures so that the security and privacy requirements of all stakeholders could be met. The time is therefore right to take a new look at mobile platform security, which is the intent of this monograph.The monograph is divided into four parts: firstly, the authors look at the how and why of mobile platform security, and this is followed by a discussion on vulnerabilities and attacks. The monograph concludes by looking forward and discussing emerging research that explores ways of dealing with hardware compromise, and building blocks for the next generation of hardware platform security. The authors have intended to provide a broad overview of the current state of practice and a glimpse of possible research directions that can be of use to practitioners, decision makers, and researchers. The focus of this monograph is on hardware platform security in mobile devices. Other forms of Security, such as OS Security, are briefly covered, but from the perspective of motivating hardware platform security. Also, specific high-level attacks such as jail-breaking or rooting are not covered, though the basic attacks described in Part III can, and often are, used as stepping stones for these high-level attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Trade Professional Drill Kit Cordless…
 (9)
R2,223 Discovery Miles 22 230
Peptine Pro Canine/Feline Hydrolysed…
R359 R249 Discovery Miles 2 490
Pink Elasticated Fabric Plaster Roll on…
R23 Discovery Miles 230
Bostik Clear Gel (25ml)
R40 Discovery Miles 400
Tommee Tippee Sports Bottle 300ml - Free…
R95 Discovery Miles 950
LocknLock Pet Dry Food Container (1.6L)
R109 R91 Discovery Miles 910
Fly Repellent ShooAway (White)(2 Pack)
R698 R578 Discovery Miles 5 780
GBC 230 MultiBind Manual Binding Machine…
R29,149 R16,999 Discovery Miles 169 990
Ultimate Cookies & Cupcakes For Kids
Hinkler Pty Ltd Kit R299 R234 Discovery Miles 2 340
6mm Yoga Mat & Carry Bag [Blue]
R191 Discovery Miles 1 910

 

Partners