HACKING MOBILE PHONES

Is your mobile phone safe from hackers? What would you do if somebody broke into your mobile phone and stole all your sensitive e-mail? What about if someone cloned your phone and made countless long-distance phone calls? What if your address book got stolen and your loved ones started receiving mal...

Full description

Saved in:
Bibliographic Details
Main Author: Fadia, Ankit 1985- (Author)
Format: Book
Language:English
Published: Boston, MA Thomson Course Technology 2006
©2006
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-349445
005 2020523154350
008 200623 2006 -US a| #0 #ENG#D
020 # # |a 1598631063  |q paperback 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5103.485  |b .F33 2006 
100 1 # |a Fadia, Ankit  |c 1985-  |e author 
245 1 1 |a HACKING MOBILE PHONES  |c Ankit Fadia 
264 # 1 |a Boston, MA  |b Thomson Course Technology  |c 2006 
264 # 1 |c ©2006 
300 # # |a xi, 307 pages  |b illustrations  |c 23 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical references (p. [215]-289) and index 
520 # # |a Is your mobile phone safe from hackers? What would you do if somebody broke into your mobile phone and stole all your sensitive e-mail? What about if someone cloned your phone and made countless long-distance phone calls? What if your address book got stolen and your loved ones started receiving malicious phone calls? What if someone broke into your mobile phone and used it to transfer funds out of your bank account? Although mobile phones are valuable tools for exchanging photos with loved ones, getting the latest sports updates, buying and selling stocks, and even running entire businesses, they have also become more dangerous than you might ever imagine. Computer criminals can hack into mobile phones to intercept data; spread viruses, worms, and mobile Trojans; steal identities; and much more. How can you defend yourself against these attacks? Simple-educate yourself with Hacking Mobile Phones, which The Hindu calls the first book on the subject aimed at educating users against mobile phone-related security loopholes, vulnerabilities, and attacks. The New Indian Express declares Fadia's book an excellent guide for all mobile phone users.Deriving data from actual research experiments, code analysis, and case and consumer studies, this book will open your eyes to security threats, secrets, and loopholes that until now went unnoticed. 
650 # 0 |a Bluetooth technology  |x Security measures 
650 # 0 |a Personal communication service systems  |x Security measures 
650 # 0 |a Cellular telephones  |x Security measures 
650 # 0 |a BlackBerry (Computer)  |x Security measures 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=349445 
964 # # |c BOK  |d 01