Детальная информация

Название Research anthology on securing mobile technologies and applications
Организация Information Resources Management Association,
Коллекция Электронные книги зарубежных издательств ; Общая коллекция
Тематика Mobile computing — Security measures. ; Cell phone systems — Security measures. ; Computer crimes — Prevention. ; EBSCO eBooks
Тип документа Другой
Тип файла PDF
Язык Английский
Права доступа Доступ по паролю из сети Интернет (чтение, печать, копирование)
Ключ записи on1243012958
Дата создания записи 15.03.2021

Разрешенные действия

pdf/2916877.pdf
Действие 'Прочитать' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
epub/2916877.epub
Действие 'Загрузить' будет доступно, если вы выполните вход в систему или будете работать с сайтом на компьютере в другой сети
Группа Анонимные пользователи
Сеть Интернет

"This book includes a variety of contributions that seek to fill the void for an all-encompassing and comprehensive reference book covering the latest and most emerging research, concepts, and theories for preventing, identifying, and mitigating the spread of fake news both within a human and technological context"--.

Место доступа Группа пользователей Действие
Локальная сеть ИБК СПбПУ Все
Прочитать Печать Загрузить
Интернет Авторизованные пользователи СПбПУ
Прочитать Печать Загрузить
Интернет Анонимные пользователи
  • Cover
  • Title Page
  • Copyright Page
  • Editorial Advisory Board
  • List of Contributors
  • Table of Contents
  • Preface
  • Section 1: Cyber Attacks, Threat Detection, and Security Frameworks
    • Chapter 1: Smartphone Security and Forensic Analysis
    • Chapter 2: Mobile Agent Communication, Security Concerns, and Approaches
    • Chapter 3: Recent Advances Delivered in Mobile Cloud Computing's Security and Management Challenges
    • Chapter 4: Identification of Cryptographic Vulnerability and Malware Detection in Android
    • Chapter 5: Android Botnets
    • Chapter 6: Preserving Security of Mobile Anchors Against Physical Layer Attacks
    • Chapter 7: A Framework for Various Attack Identification in MANET Using Multi-Granular Rough Set
    • Chapter 8: A Systematic Study and Analysis of Security Issues in Mobile Ad-hoc Networks
    • Chapter 9: A Survey of Efficient Trust Management Schemes in Mobile Ad-Hoc Network
    • Chapter 10: Communiqué Issues in MANET and VANET Protocols With Network Security Disquiet
    • Chapter 11: Optimized Three-Dimensional Security Framework to Mitigate Risks Arising From BYOD-Enabled Business Environment
    • Chapter 12: Simple Screen Locking Method Using Randomly Generated Number Grid on Image
    • Chapter 13: Phishing Attacks in Mobile Platforms
    • Chapter 14: A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques
    • Chapter 15: Feature Based Approach for Detection of Smishing Messages in the Mobile Environment
    • Chapter 16: Securing Communication 2FA Using Post-Quantic Cryptosystem
  • Section 2: Data Protection, Privacy, and User Risk Awareness
    • Chapter 17: Smartphone Confrontational Applications and Security Issues
    • Chapter 18: Theft Preventive Measures for Interconnected Personal Computer Devices as Proactive Physical Security of Data
    • Chapter 19: Mobile Cyber Information Leakage
    • Chapter 20: Protection of the Communication and Digital Security of Mobile Phones as a Fundamental Right to Privacy
    • Chapter 21: Achieving Secure and Privacy-Preserving in Mobile Social Networks
    • Chapter 22: User Identity Hiding Method of Android
    • Chapter 23: Biometric Systems in Mobile Devices
    • Chapter 24: Cell Phone Security
    • Chapter 25: Importance of Information Security and Strategies to Prevent Data Breaches in Mobile Devices
    • Chapter 26: Mobile Phone Usage Patterns, Security Concerns, and Security Practices of Digital Generation
    • Chapter 27: Expectations and Experiences of Implementing a Mobile Secure Communication Application
    • Chapter 28: Smart Phone Security Practices
    • Chapter 29: Awareness, Knowledge, and Ability of Mobile Security Among Young Mobile Phone Users
    • Chapter 30: Coping Strategies and Paradoxes Related to BYOD Information Security Threats in France
  • Section 3: Security Issues for Apps, Mobile Banking, and Mobile Payment
    • Chapter 31: Threats and Vulnerabilities of Mobile Applications
    • Chapter 32: Techniques for Analysis of Mobile Malware
    • Chapter 33: Native vs. Hybrid Mobile Applications as Society Enters the Internet of Things
    • Chapter 34: Android Application Security
    • Chapter 35: A Hybrid Approach to Detect the Malicious Applications in Android-Based Smartphones Using Deep Learning
    • Chapter 36: Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches
    • Chapter 37: How Do Mobile Applications for Cancer Communicate About Their Privacy Practices?
    • Chapter 38: How Relevant Are Risk Perceptions, Effort, and Performance Expectancy in Mobile Banking Adoption?
    • Chapter 39: The Mediating Role of Perceived Value in the Effect of Multi-Dimensional Risk in Mobile Banking
    • Chapter 40: An Investigation into Permissions Requested by Mobile Banking on Android Platform
    • Chapter 41: Mobile Commerce Technologies and Management
    • Chapter 42: A Study of e-Commerce Transaction Risk Assessment Model in Mobile Internet
    • Chapter 43: LD Based Framework to Mitigate Threats in Mobile Based Payment System
    • Chapter 44: Identity Authentication Security Management in Mobile Payment Systems
  • Index
pdf/2916877.pdf

Количество обращений: 2 
За последние 30 дней: 0

Подробная статистика

epub/2916877.epub

Количество обращений: 1 
За последние 30 дней: 0

Подробная статистика