Editore: LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330073071 ISBN 13: 9783330073074
Lingua: Inglese
Da: moluna, Greven, Germania
EUR 35,75
Convertire valutaQuantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
Editore: LAP LAMBERT Academic Publishing Mai 2017, 2017
ISBN 10: 3330073071 ISBN 13: 9783330073074
Lingua: Inglese
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
EUR 41,90
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware -An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage.Books on Demand GmbH, Überseering 33, 22297 Hamburg 196 pp. Englisch.
Editore: LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330073071 ISBN 13: 9783330073074
Lingua: Inglese
Da: Revaluation Books, Exeter, Regno Unito
EUR 71,72
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 196 pages. 8.66x5.91x0.45 inches. In Stock.
Editore: LAP LAMBERT Academic Publishing Mai 2017, 2017
ISBN 10: 3330073071 ISBN 13: 9783330073074
Lingua: Inglese
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
EUR 41,90
Convertire valutaQuantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage. 196 pp. Englisch.
Editore: LAP LAMBERT Academic Publishing, 2017
ISBN 10: 3330073071 ISBN 13: 9783330073074
Lingua: Inglese
Da: AHA-BUCH GmbH, Einbeck, Germania
EUR 41,90
Convertire valutaQuantità: 1 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage.