Securing mobile devices and technology / Kutub Thakur and Al-Sakib Khan Pathan.
Material type:
TextLanguage: English. Publication details: Boca Raton : CRC Press, c2022.Description: xviii, 257 pages : illustrations ; 24 cmISBN: - 9781032136127
- CIR TK 102.85 T43 2022
| Cover image | Item type | Current library | Home library | Collection | Shelving location | Call number | Materials specified | Vol info | URL | Copy number | Status | Notes | Date due | Barcode | Item holds | Item hold queue priority | Course reserves | |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Book
|
Cavite State University - CCAT Campus | Book | GCS | CIR TK 102.85 T43 2022 (Browse shelf(Opens below)) | 1 | Available | R0013090 |
Browsing Cavite State University - CCAT Campus shelves,Shelving location: GCS,Collection: Book Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
|
||
| CIR TJ810 M33 2012 Solar energy fundamentals / | CIR TJ810 S65 2017 Solar power : technologies and applications / | CIR TJ 930 P57 2014 Pipeline rules of thumb handbook : a manual of quick, accurate solutions to everyday pipeline engineering problems / | CIR TK 102.85 T43 2022 Securing mobile devices and technology / | CIR TK 454.046 O43 1982 Schaum's outline of theory and problems of basic circuit analysis / | CIR TK 871.99.M44 K36 2015 CMOS digital integrated circuits : analysis and design / | CIR TK 874.84 G37 2016 Nano electronics / |
Includes bibliographical references and index.
"This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners"-- Provided by publisher
13090
In English text.
There are no comments on this title.
