Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. Security and secrets of mobile phones will be discussed such as software and hardware interception, fraud and other malicious techniques used aagainsta users will be analyzed. Readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis.Table 4.5 Call management features 0 Followed by SEND Releases all held calls or sets user determined user busy ... from both calls (ECT) 4 * aDirectory numbera Redirect an incoming or a waiting call to the specified directory Followed byanbsp;...
|Title||:||Mobile Phone Security and Forensics|
|Author||:||Iosif I. Androulidakis|
|Publisher||:||Springer Science & Business Media - 2012-03-29|