Research Anthology on Securing Mobile Technologies and Applications

· IGI Global
৫.০
১ টা পৰ্যালোচনা
ইবুক
837
পৃষ্ঠা
যোগ্য

এই ইবুকখনৰ বিষয়ে

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing.

The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

মূল্যাংকন আৰু পৰ্যালোচনাসমূহ

৫.০
১ টা পৰ্যালোচনা

লিখকৰ বিষয়ে

Information Resources Management Association (IRMA) is a research-based professional organization dedicated to advancing the concepts and practices of information resources management in modern organizations. IRMA's primary purpose is to promote the understanding, development and practice of managing information resources as key enterprise assets among IRM/IT professionals. IRMA brings together researchers, practitioners, academicians, and policy makers in information technology management from over 50 countries. [Editor]

এই ইবুকখনক মূল্যাংকন কৰক

আমাক আপোনাৰ মতামত জনাওক।

পঢ়াৰ নির্দেশাৱলী

স্মাৰ্টফ’ন আৰু টেবলেট
Android আৰু iPad/iPhoneৰ বাবে Google Play Books এপটো ইনষ্টল কৰক। ই স্বয়ংক্রিয়ভাৱে আপোনাৰ একাউণ্টৰ সৈতে ছিংক হয় আৰু আপুনি য'তে নাথাকক ত'তেই কোনো অডিঅ'বুক অনলাইন বা অফলাইনত শুনিবলৈ সুবিধা দিয়ে।
লেপটপ আৰু কম্পিউটাৰ
আপুনি কম্পিউটাৰৰ ৱেব ব্রাউজাৰ ব্যৱহাৰ কৰি Google Playত কিনা অডিঅ'বুকসমূহ শুনিব পাৰে।
ই-ৰীডাৰ আৰু অন্য ডিভাইচ
Kobo eReadersৰ দৰে ই-চিয়াঁহীৰ ডিভাইচসমূহত পঢ়িবলৈ, আপুনি এটা ফাইল ডাউনল’ড কৰি সেইটো আপোনাৰ ডিভাইচলৈ স্থানান্তৰণ কৰিব লাগিব। সমৰ্থিত ই-ৰিডাৰলৈ ফাইলটো কেনেকৈ স্থানান্তৰ কৰিব জানিবলৈ সহায় কেন্দ্ৰত থকা সবিশেষ নিৰ্দেশাৱলী চাওক।

Management Association, Information Resourcesৰ দ্বাৰা আৰু অধিক

একেধৰণৰ ই-বুক