WIN $150 GIFT VOUCHERS: ALADDIN'S GOLD

Close Notification

Your cart does not contain any items

$103

Paperback

Not in-store but you can order this
How long will it take?

QTY:

English
CRC Press
17 December 2021
This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks, while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobiles, IoT (Internet of Things) devices for shopping and password management, and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners.
By:   , ,
Imprint:   CRC Press
Country of Publication:   United Kingdom
Dimensions:   Height: 234mm,  Width: 156mm, 
Weight:   408g
ISBN:   9781032136127
ISBN 10:   103213612X
Pages:   258
Publication Date:  
Audience:   Professional and scholarly ,  College/higher education ,  Undergraduate ,  Further / Higher Education
Format:   Paperback
Publisher's Status:   Active
1. The Evolution of Data Communication Networks 2. History of Cellular Technology 3. Role of Mobile Technology in Modern World 4. Mobile Security in Perspective 5. Working Principle of Major Wireless Networks 6. Working Principle of Cellular Network 7. Types of Mobile Security Threats 8. Mobile Security Threats in Internet of Things Ecosystem 9. How to Secure Your Mobile Devices? 10. Mobile Password Management 11. Securing Wireless Network Communication 12. Secure Shopping through Mobiles 13. World of Mobile Apps: Security Threats & Solutions 14. Mobile Wireless Technology & Security Standards Bibliography Index

Kutub Thakur is an assistant professor of cyber security and leads NJCU's cyber security program. Kutub teaches Cyber Security and Forensics at the undergraduate and graduate levels. Kutub is certified in computer hacking and forensic investigation. He worked for various private and public entities such as Lehman Brothers, Barclays Capital, ConEdison, United Nations and Metropolitan Transport Authority. Kutub has various publications in IEEE, I-manager’s Journal, Application and Theory of Computer Technology, and the International Journal for Engineering and Technology. He has presented at the IEEE International Conference on High Performance and Smart Computing, IEEE 2nd International Conference on Cyber Security and Cloud Computing and IEEE International Conference on Big Data Security on Cloud. Kutub is an active member of infraGrad (FBI), Homeland Security Information Network, and Research Education Network Information Sharing Analysis Center and Institute of Electrical and Electronics Engineers. Kutub research interests includes Cyber security, forensics and machine learning. Kutub holds a Ph.D. in Computer Science from Pace University. He is also author of the book “Cybersecurity Fundamentals: A Real-World Perspective” published by CRC Press. Al-Sakib Khan Pathan is a Professor of Computer Science and Engineering. Currently, he is with the Independent University, Bangladesh as an Adjunct Professor. He received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. In his academic career so far, he worked as a faculty member at the CSE Department of Southeast University, Bangladesh during 2015-2020, Computer Science department, International Islamic University Malaysia (IIUM), Malaysia during 2010-2015; at BRACU, Bangladesh during 2009-2010, and at NSU, Bangladesh during 2004-2005. He was a Guest Lecturer for the STEP project at the Department of Technical and Vocational Education, Islamic University of Technology, Bangladesh in 2018. He also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009 where he completed his MS leading to PhD. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has several notable publications in these areas. So far, he has delivered over 22 Keynotes and Invited speeches at various international conferences and events. He has served as a General Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous top-ranked international conferences/workshops like INFOCOM, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, SGIoT, etc. He was awarded the IEEE Outstanding Leadership Award for his role in IEEE GreenCom’13 conference. He is currently serving as the Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, UK, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, International Journal of Sensor Networks, Inderscience Publishers, and Malaysian Journal of Computer Science, Associate Editor of Connection Science, Taylor & Francis, UK, International Journal of Computational Science and Engineering, Inderscience, Area Editor of International Journal of Communication Networks and Information Security, Guest Editor of many special issues of top-ranked journals, and Editor/Author of 22 books. One of his books has been included twice in Intel Corporation’s Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society’s (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, several other books were indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, in February 2015, at least one has been approved as a textbook at NJCU, USA in 2020, and one book has been translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper were included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of many prestigious journals. He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT several times; Elsevier Outstanding Reviewer for Computer Networks, Ad Hoc Networks, FGCS, and JNCA in multiple years. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.

See Also