qWith viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern in the mobile communications industry. Helping you become a mobile security specialist, this timely resource explains the essentials of the latest security standards and protocols. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's weaknesses and provides you with comprehensive countermeasures. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. You find a complete catalog of security vulnerabilities to ensure that every security measure is taken. Moreover, this forward-looking reference includes a practical, hands-on discussion of promising next-generation research into mobile security that helps prepare you for the ever-looming next waves of security threats.q--Publisher's website.5.5.5 Code Signing The OSa#39;s security may be augmented by a code-signing mechanism, with which the origin of programs and device drivers can be verified. ... Fake dialogs are also possible because of malware and may be used to bypass signature verification. ... With mobile maintenance programs (e.g., the Nokia Wintesla maintenance program ), several interventions in the mobile platform areanbsp;...
|Title||:||Security for Mobile Networks and Platforms|
|Author||:||Selim Aissi, Nora Dabbous|
|Publisher||:||Artech House Publishers - 2006|