LEADER 01931oam 2200505I 450 001 9910153184703321 005 20210104163654.0 010 $a1-315-36964-8 010 $a1-4987-3592-4 010 $a1-315-35263-X 024 7 $a10.1201/9781315369648 035 $a(CKB)3710000000960816 035 $a(MiAaPQ)EBC4748359 035 $a(OCoLC)966374418 035 $a(PPN)242918085 035 $a(EXLCZ)993710000000960816 100 $a20180331h20172017 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 00$aProtecting mobile networks and devices $echallenges and solutions /$fedited by Weizhi Meng, Xiapu Luo, Steven Furnell, Jianying Zhou 210 1$aBoca Raton :$cCRC Press is an imprint of the Taylor & Francis Group, an Informa Business,$d[2017] 210 4$dİ2017 215 $a1 online resource (334 pages) $cillustrations 225 0 $aCRC Series in Security, Privacy and Trust 311 $a1-4987-3583-5 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aSection I. Authentication techniques for mobile devices -- Section II. Mobile device privacy -- Section III. Mobile operating system vulnerabilities -- Section IV. Malware classification and detection -- Section V. Mobile network security. 606 $aMobile communication systems$xSecurity measures 606 $aSmartphones$xSecurity measures 615 0$aMobile communication systems$xSecurity measures. 615 0$aSmartphones$xSecurity measures. 676 $a005.4/46 702 $aMeng$b Weizhi$f1986- 702 $aLuo$b Xiapu 702 $aFurnell$b Steven$f1970- 702 $aZhou$b Jianying 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910153184703321 996 $aProtecting mobile networks and devices$92273896 997 $aUNINA