- Mobile Security:How to Secure,Privatize,and Recover Your Devices
- Tim Speed Darla Nykamp Mari Heiser Joseph Anderson Jaya Nampalli
- 152字
- 2021-08-06 16:59:28
Chapter 1. Living in a Mobile World
Smartphones are the essential devices of the modern mobile world. We use smartphones to tackle seemingly limitless tasks such as texting, chatting, shopping online, updating our social networking status, researching, emailing, creating documents, making phone calls, video conferencing, and banking. The list will only grow as smartphone capabilities continue to expand. 50.4 percent of US consumers own a smartphone; a percentage which is projected to increase as it has, every previous year (http://techcrunch.com/2012/05/07/nielsen-smartphones-used-by-50-4-of-u-s-consumers-android-48-5-of-them/).
Smartphones are attractive devices that can simplify many of our most essential and mundane tasks. Not only do they allow us to connect and interact with others in a simplified manner, but they also allow us to conduct many essential business tasks without the need for comparatively bulky laptops. However, in addition to the seeming wealth of capabilities provided by these devices, smartphones also carry a certain number of risks.
- Extending Symfony2 Web Application Framework
- 數據恢復方法及案例分析
- 為你護航:網絡空間安全科普讀本(第2版)
- Metasploit Penetration Testing Cookbook(Third Edition)
- Learning Python for Forensics
- 信息系統安全檢測與風險評估
- Penetration Testing with Perl
- Enterprise Cloud Security and Governance
- 代碼審計:企業級Web代碼安全架構
- 網絡安全技術及應用(第3版)
- 模糊測試:強制發掘安全漏洞的利器
- 網絡關鍵設備安全檢測實施指南
- Kali Linux高級滲透測試(原書第4版)
- 功能型密碼算法設計與分析
- Securing Network Infrastructure