This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
Here is the definitive Bible on the architectures of the systems that provide telephone service, including a look at architectures for future systems. Describing in detail the hardware and software of four major systems widely used in the US today, plus two others commonly used worldwide, you get the comprehensive information you need to understand switching systems in historical context and in relation to regulatory frameworks. Plus, you see how factors such as customer services and modern computer applications have affected switching systems, and you get background discussions on relevant theory and boundary conditions -- such as transmission systems, telephone operation, and the human element.
Ram Mounts Articles
Ram Mounts Books