Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.


Author
Publisher IGI Global
Release Date
ISBN 1799886018
Pages 837 pages
Rating 4/5 (13 users)
Read More

More Books:

Research Anthology on Securing Mobile Technologies and Applications
Language: en
Pages: 837
Authors: Management Association, Information Resources
Categories: Technology & Engineering
Type: BOOK - Published: 2021-02-05 - Publisher: IGI Global

Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users
Research Anthology on Securing Mobile Technologies and Applications, VOL 2
Language: en
Pages: 460
Authors: Information R. . . Management Association
Categories:
Type: BOOK - Published: 2021-04-19 - Publisher:

Research Anthology on Securing Mobile Technologies and Applications, VOL 1
Language: en
Pages: 448
Authors: Information R. . . Management Association
Categories:
Type: BOOK - Published: 2021-04-19 - Publisher:

Digital Technologies and Applications
Language: en
Pages: 745
Authors: Saad Motahhir
Categories: Technology & Engineering
Type: BOOK - Published: 2022-08-06 - Publisher: Springer Nature

This book presents Volume 1 of selected research papers presented at the Second International Conference on Digital Technologies and Applications (ICDTA 22), he
Research Anthology on Artificial Intelligence Applications in Security
Language: en
Pages: 2253
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2020-11-27 - Publisher: IGI Global

As industries are rapidly being digitalized and information is being more heavily stored and transmitted online, the security of information has become a top pr
Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity
Language: en
Pages: 292
Authors: Lobo, Victor
Categories: Computers
Type: BOOK - Published: 2022-06-24 - Publisher: IGI Global

The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites
Research Anthology on Securing Medical Systems and Records
Language: en
Pages: 1060
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2022-06-03 - Publisher: IGI Global

With the influx of internet and mobile technology usage, many medical institutions—from doctor’s offices to hospitals—have implemented new online technolo
Research Anthology on Concepts, Applications, and Challenges of FinTech
Language: en
Pages: 671
Authors: Management Association, Information Resources
Categories: Business & Economics
Type: BOOK - Published: 2021-02-05 - Publisher: IGI Global

FinTech, an abbreviated term for financial technology, is a digital revolution changing the way banking and financial services are being used both by individual
Research Anthology on Machine Learning Techniques, Methods, and Applications
Language: en
Pages: 1516
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2022-05-13 - Publisher: IGI Global

Machine learning continues to have myriad applications across industries and fields. To ensure this technology is utilized appropriately and to its full potenti
Research Anthology on Privatizing and Securing Data
Language: en
Pages: 2188
Authors: Management Association, Information Resources
Categories: Computers
Type: BOOK - Published: 2021-04-23 - Publisher: IGI Global

With the immense amount of data that is now available online, security concerns have been an issue from the start, and have grown as new technologies are increa