PART THREE
Mobile Security
CHAPTER 11 Mobile Communication Security Challenges
CHAPTER 12 Mobile Device Security Models
CHAPTER 13 Mobile Wireless Attacks and Remediation
CHAPTER 14 Fingerprinting Mobile Devices
CHAPTER 15 Mobile Malware and Application-Based Threats
3.19.56.45