Over the last two decades, mobile telecommunications has grown dramatically, from a small niche technology to a massive industry. Mobile telephones are now ubiquitous, and the divisions between PCs, PDAs, mobile telephones and other mobile devices are becoming increasingly blurred. Against this background, the security of information of both the devices themselves, and the information handled by these devices, is becoming ever more important. Security for Mobility pulls together up to the minute research from an international group of academics and professionals working in industry. The main text of the book is divided into five parts - underlying technologies; network security; mobile code issues; application security; and the future. Each chapter of the book is the collaboration of different authors, including many of the leading European experts currently working within the field. Thus each chapter is self-contained and can be read independently, although there are many relationships between the various chapters. The book will be of interest to engineers and computer scientists working in security-related aspects of the communications, computing and telecommunications industries, as well as postgraduate students and academics working within these fields.Content extraction is the removal or manipulation of DRM protection from protected contentso thatthe content exists ... For example, the rights might be changed so that it gives an unlimited number of plays instead of a finite number of plays.
|Title||:||Security for Mobility|
|Author||:||Chris J. Mitchell|
|Publisher||:||IET - 2004|