An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage.
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage.
Mattieu Detaille & Mohammad Muntasib Ali Syed, both computer science engineers, are passionate about cyber security as well as artificial intelligence. They obtained a bachelor and master in engineering at Université catholique de Louvain, in Belgium. Mattieu is currently studying in San Francisco. Muntasib is currently working as an IT consultant.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der Deutschland
Versandziele, Kosten & DauerAnbieter: moluna, Greven, Deutschland
Zustand: New. Bestandsnummer des Verkäufers 151236388
Anzahl: Mehr als 20 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage.Books on Demand GmbH, Überseering 33, 22297 Hamburg 196 pp. Englisch. Bestandsnummer des Verkäufers 9783330073074
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage. Bestandsnummer des Verkäufers 9783330073074
Anzahl: 1 verfügbar
Anbieter: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Deutschland
Taschenbuch. Zustand: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -An amazing amount of new technologies has been introduced into our homes in the 21st century. Among them, are the widely-used smart devices, such as smartphones and smart TVs. These smart devices are known to gather data, which raises concerns about privacy and the risk of information leakage. The purpose of this book is to bring to light the dangerous practices used by software in such devices that lead to the leakage of sensitive data; and propose a system that identifies the sources of the leaks. As connectivity is the main feature of smart devices, the system investigate their network traffic, in search of design vulnerabilities. More than just passive search, the system also performs a Man in the Middle attack in order to decrypt and analyze the information transiting through the encrypted traffic. Experimental results demonstrate that widely-used applications such as PayPal present several sources of leakage. The system allows users to assess the risks of utilizing a smart device or any of its applications. It can also be used by companies as a means of auditing the network traffic of their product in order to verify its quality in term of privacy and risk of leakage. 196 pp. Englisch. Bestandsnummer des Verkäufers 9783330073074
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 196 pages. 8.66x5.91x0.45 inches. In Stock. Bestandsnummer des Verkäufers 3330073071
Anzahl: 1 verfügbar
Anbieter: Mispah books, Redhill, SURRE, Vereinigtes Königreich
paperback. Zustand: New. New. book. Bestandsnummer des Verkäufers ERICA82933300730716
Anzahl: 1 verfügbar