HACKING MOBILE PHONES
Is your mobile phone safe from hackers? What would you do if somebody broke into your mobile phone and stole all your sensitive e-mail? What about if someone cloned your phone and made countless long-distance phone calls? What if your address book got stolen and your loved ones started receiving mal...
Saved in:
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Boston, MA
Thomson Course Technology
2006
©2006 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-349445 | ||
005 | 2020523154350 | ||
008 | 200623 2006 -US a| #0 #ENG#D | ||
020 | # | # | |a 1598631063 |q paperback |
040 | # | # | |a UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5103.485 |b .F33 2006 |
100 | 1 | # | |a Fadia, Ankit |c 1985- |e author |
245 | 1 | 1 | |a HACKING MOBILE PHONES |c Ankit Fadia |
264 | # | 1 | |a Boston, MA |b Thomson Course Technology |c 2006 |
264 | # | 1 | |c ©2006 |
300 | # | # | |a xi, 307 pages |b illustrations |c 23 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |a volume |2 rdacarrier |
504 | # | # | |a Includes bibliographical references (p. [215]-289) and index |
520 | # | # | |a Is your mobile phone safe from hackers? What would you do if somebody broke into your mobile phone and stole all your sensitive e-mail? What about if someone cloned your phone and made countless long-distance phone calls? What if your address book got stolen and your loved ones started receiving malicious phone calls? What if someone broke into your mobile phone and used it to transfer funds out of your bank account? Although mobile phones are valuable tools for exchanging photos with loved ones, getting the latest sports updates, buying and selling stocks, and even running entire businesses, they have also become more dangerous than you might ever imagine. Computer criminals can hack into mobile phones to intercept data; spread viruses, worms, and mobile Trojans; steal identities; and much more. How can you defend yourself against these attacks? Simple-educate yourself with Hacking Mobile Phones, which The Hindu calls the first book on the subject aimed at educating users against mobile phone-related security loopholes, vulnerabilities, and attacks. The New Indian Express declares Fadia's book an excellent guide for all mobile phone users.Deriving data from actual research experiments, code analysis, and case and consumer studies, this book will open your eyes to security threats, secrets, and loopholes that until now went unnoticed. |
650 | # | 0 | |a Bluetooth technology |x Security measures |
650 | # | 0 | |a Personal communication service systems |x Security measures |
650 | # | 0 | |a Cellular telephones |x Security measures |
650 | # | 0 | |a BlackBerry (Computer) |x Security measures |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=349445 |
964 | # | # | |c BOK |d 01 |