Ditemukan 4 dokumen yang sesuai dengan query
"
Over the last decade, mobile telecommunications has grown dramatically, from a niche technology to a massive industry. As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobiles phones and other mobile devices becomes blurred, the security both of the information handled by these devices and the devices themselves becomes increasingly important. The book consists of 17 chapters covering current developments in security for mobility; underlying technologies; network security; mobile code ...
"
London: Institution of Engineering and Technology, 2009
e20452642
eBooks Universitas Indonesia Library
Tom Lovett, editor
"
Mobile context awareness presents work from industrial and academic researchers, focusing on novel methods of context acquisition in the mobile environment – particularly through the use of physical and virtual sensors – along with research into new applications utilising this context. In addition, the book provides insights into the technical and usability challenges involved in mobile context-awareness, as well as observations on current and future trends in the field ...
"
London: Springer, 2012
e20407419
eBooks Universitas Indonesia Library
Mohammad Ilyas, 1953-
"
Contents :
- Chapter One: Introduction
- Chapter Two: Symbian OS
- Chapter Three: UIQ
- Chapter Four: The Series 60 Platform
- Chapter Five: Windows Mobile 2003 Second-Edition Software for
Smartphones
- Chapter Six: Linux
- Chapter Seven: Conclusion
- Appendix A: Mobile Devices Feature Set
- Appendix B: Smartphone Reference Solutions ...
"
Chicago: International Engineering Consortium, 2006
e20451440
eBooks Universitas Indonesia Library
Androulidakis, Iosif I.
"
Mobile phone security and forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. ...
"
New York: [, Springer], 2012
e20418401
eBooks Universitas Indonesia Library