Research Anthology on Securing Mobile Technologies and Applications
Title | Research Anthology on Securing Mobile Technologies and Applications PDF eBook |
Author | Management Association, Information Resources |
Publisher | IGI Global |
Pages | 837 |
Release | 2021-02-05 |
Genre | Technology & Engineering |
ISBN | 1799886018 |
Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.
Mobile Agents in Networking and Distributed Computing
Title | Mobile Agents in Networking and Distributed Computing PDF eBook |
Author | Jiannong Cao |
Publisher | John Wiley & Sons |
Pages | 352 |
Release | 2012-07-31 |
Genre | Technology & Engineering |
ISBN | 047175160X |
The book focuses on mobile agents, which are computer programs that can autonomously migrate between network sites. This text introduces the concepts and principles of mobile agents, provides an overview of mobile agent technology, and focuses on applications in networking and distributed computing.
Computer Security - ESORICS 96
Title | Computer Security - ESORICS 96 PDF eBook |
Author | Elisa Bertino |
Publisher | Springer Science & Business Media |
Pages | 390 |
Release | 1996-09-16 |
Genre | Business & Economics |
ISBN | 9783540617709 |
This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96. The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.
Mobile Agents and Security
Title | Mobile Agents and Security PDF eBook |
Author | Giovanni Vigna |
Publisher | Springer |
Pages | 269 |
Release | 2003-05-20 |
Genre | Computers |
ISBN | 3540686711 |
New paradigms can popularize old technologies. A new \standalone" paradigm, the electronic desktop, popularized the personal computer. A new \connected" paradigm, the web browser, popularized the Internet. Another new paradigm, the mobile agent, may further popularize the Internet by giving people greater access to it with less eort. MobileAgentParadigm The mobile agent paradigm integrates a network of computers in a novel way designed to simplify the development of network applications. To an application developer the computers appear to form an electronic world of places occupied by agents. Each agent or place in the electronic world has the authority of an individual or an organization in the physical world. The authority can be established, for example, cryptographically. A mobile agent can travel from one place to another subject to the des- nation place’s approval. The source and destination places can be in the same computer or in di erent computers. In either case,the agentinitiates the trip by executing a \go" instruction which takes as an argument the name or address of the destination place. The next instruction in the agent’s program is executed in the destination place, rather than in the source place. Thus, in a sense, the mobile agent paradigm reduces networking to a program instruction. A mobile agent can interact programmatically with the places it visits and, if the other agents approve, with the other agents it encounters in those places.
Computer Networks and Inventive Communication Technologies
Title | Computer Networks and Inventive Communication Technologies PDF eBook |
Author | S. Smys |
Publisher | Springer Nature |
Pages | 1212 |
Release | 2021-06-02 |
Genre | Technology & Engineering |
ISBN | 9811596476 |
This book is a collection of peer-reviewed best selected research papers presented at 3rd International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2020). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference is a valuable resource, dealing with both the important core and the specialized issues in the areas of next generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advance work in the area.
Encyclopedia of Information Ethics and Security
Title | Encyclopedia of Information Ethics and Security PDF eBook |
Author | Quigley, Marian |
Publisher | IGI Global |
Pages | 696 |
Release | 2007-05-31 |
Genre | Business & Economics |
ISBN | 1591409888 |
Rapid technological advancement has given rise to new ethical dilemmas and security threats, while the development of appropriate ethical codes and security measures fail to keep pace, which makes the education of computer users and professionals crucial. The Encyclopedia of Information Ethics and Security is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool includes topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. This encyclopedia is a useful tool for students, academics, and professionals.
Mobile Computing and Wireless Communications
Title | Mobile Computing and Wireless Communications PDF eBook |
Author | Amjad Umar |
Publisher | nge solutions, inc |
Pages | 716 |
Release | 2004 |
Genre | Technology & Engineering |
ISBN | 9780975918203 |
This book, suitable for IS/IT courses and self study, presents a comprehensive coverage of the technical as well as business/management aspects of mobile computing and wireless communications. Instead of one narrow topic, this classroom tested book covers the major building blocks (mobile applications, mobile computing platforms, wireless networks, architectures, security, and management) of mobile computing and wireless communications. Numerous real-life case studies and examples highlight the key points. The book starts with a discussion of m-business and m-government initiatives and examines mobile computing applications such as mobile messaging, m-commerce, M-CRM, M-portals, M-SCM, mobile agents, and sensor applications. The role of wireless Internet and Mobile IP is explained and the mobile computing platforms are analyzed with a discussion of wireless middleware, wireless gateways, mobile application servers, WAP, i-mode, J2ME, BREW, Mobile Internet Toolkit, and Mobile Web Services. The wireless networks are discussed at length with a review of wireless communication principles, wireless LANs with emphasis on 802.11 LANs, Bluetooth, wireless sensor networks, UWB (Ultra Wideband), cellular networks ranging from 1G to 5G, wireless local loops, FSO (Free Space Optics), satellites communications, and deep space networks. The book concludes with a review of the architectural, security, and management/support issues and their role in building, deploying and managing wireless systems in modern settings.