0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 1 of 1 matches in All Departments

Hardware Platform Security for Mobile Devices (Paperback): Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand,... Hardware Platform Security for Mobile Devices (Paperback)
Lachlan J. Gunn, N. Asokan, Jan-Erik Ekberg, Hans Liljestrand, Vijayanand Nayani, …
R2,339 Discovery Miles 23 390 Ships in 10 - 15 working days

Personal mobile devices like smartphones and tablets are ubiquitous. People use mobile devices for fun, for work, and for organizing and managing their lives, including their finances. This has become possible because over the past two decades, mobile phones evolved from closed platforms intended for voice calls and messaging to open platforms whose functionality can be extended in myriad ways by third party developers. Such wide-ranging scope of use also means widely different security and privacy requirements for those uses. As mobile platforms gradually opened, platform security mechanisms were incorporated into their architectures so that the security and privacy requirements of all stakeholders could be met. The time is therefore right to take a new look at mobile platform security, which is the intent of this monograph.The monograph is divided into four parts: firstly, the authors look at the how and why of mobile platform security, and this is followed by a discussion on vulnerabilities and attacks. The monograph concludes by looking forward and discussing emerging research that explores ways of dealing with hardware compromise, and building blocks for the next generation of hardware platform security. The authors have intended to provide a broad overview of the current state of practice and a glimpse of possible research directions that can be of use to practitioners, decision makers, and researchers. The focus of this monograph is on hardware platform security in mobile devices. Other forms of Security, such as OS Security, are briefly covered, but from the perspective of motivating hardware platform security. Also, specific high-level attacks such as jail-breaking or rooting are not covered, though the basic attacks described in Part III can, and often are, used as stepping stones for these high-level attacks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
I Will Not Be Silenced
Karyn Maughan Paperback R350 R199 Discovery Miles 1 990
John C. Maxwell Undated Planner
Paperback R469 R315 Discovery Miles 3 150
Aeno Table Blender - Soupmaker TB1…
R2,299 Discovery Miles 22 990
Fly Repellent ShooAway (Black)(4 Pack)
R1,396 R1,076 Discovery Miles 10 760
Kirstenbosch - A Visitor's Guide
Colin Paterson-Jones, John Winter Paperback R160 R125 Discovery Miles 1 250
Moonology Diary 2025
Yasmin Boland Paperback R464 R374 Discovery Miles 3 740
- (Subtract)
Ed Sheeran CD R165 R56 Discovery Miles 560
Genuine Leather Wallet With Clip Closure…
R299 R252 Discovery Miles 2 520
Maze Runner 2: The Scorch Trials
Thomas Brodie-Sangster, Nathalie Emmanuel, … Blu-ray disc R36 Discovery Miles 360
Bostik Art & Craft White Glue (100ml)
R51 Discovery Miles 510

 

Partners