{"id":709,"date":"2011-05-15T21:28:26","date_gmt":"2011-05-15T19:28:26","guid":{"rendered":"http:\/\/cerezo.name\/blog\/?p=709"},"modified":"2024-10-14T14:19:55","modified_gmt":"2024-10-14T12:19:55","slug":"books-on-mobile-security","status":"publish","type":"post","link":"http:\/\/cerezo.name\/blog\/2011\/05\/15\/books-on-mobile-security\/","title":{"rendered":"Books on Mobile Security"},"content":{"rendered":"<p style=\"text-align: justify;\">All the recent news about the Android and iPhone smartphones storing geo-location data without the user\u2019s knowledge and consent are just the tip the iceberg of the very long history of the clash between the growing functionality of mobile phones and the unawareness of the userbase, and a omen of what\u2019s to come in the ever increasing privacy erosion created by the digital world. The applications to uncover the hidden <em>features<\/em> are freely available (<a href=\"http:\/\/petewarden.github.com\/iPhoneTracker\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">iPhoneTracker<\/a>, <a href=\"https:\/\/market.android.com\/details?id=ch.rrelmy.android.locationcachemap\" target=\"_blank\" rel=\"noopener\" class=\"broken_link\">Location Cache<\/a>) and it was their very own existence what propelled the public worry and interest.<\/p>\n<p style=\"text-align: justify;\">Yet as <a href=\"http:\/\/en.wikipedia.org\/wiki\/Scott_McNealy\" target=\"_blank\" rel=\"noopener\">Scott McNealy<\/a>, <span class=\"caps\">CEO<\/span> and co-founder of <span class=\"caps\">SUN<\/span>, once said, \u201cYou have zero privacy anyway, get over it\u201d: a truth best-known to computer scientist but hardly understood by the general public.<\/p>\n<p style=\"text-align: justify;\">I\u2019ve also been reading the very small list of books written on mobile security, and these are my recommendations:<\/p>\n<ul>\n<li style=\"text-align: justify;\">[amazon_link id=\u201c1439820163\u201d target=\u201c_blank\u201d ]Mobile Device Security: A Comprehensive Guide to Securing Your Information in a Moving World[\/amazon_link]. Very high level and non-technical overview of the new mobile paradigm for computing and communications, covering the threats, risks, scenarios, business cases, security models and policies of organizations. Technical readers will be highly disappointed.<\/li>\n<li style=\"text-align: justify;\">[amazon_link id=\u201c0071633561\u201d target=\u201c_blank\u201d ]Mobile Application Security[\/amazon_link]. Recent book covering all the topics required to master mobile application security, making it a very good compilation of all the data currently scattered all over the net. It covers all the mobile operating systems, even the disappearing ones (Windows Mobile, WebOS, Symbian, Java <span class=\"caps\">ME<\/span>) and the specific mobile technologies (Bluetooth, <span class=\"caps\">SMS<\/span>, geolocation). An expanded chapter on enterprise security on the mobile <span class=\"caps\">OS<\/span> would be preferred.<\/li>\n<li style=\"text-align: justify;\">[amazon_link id=\u201c1597492981\u201d target=\u201c_blank\u201d ]Mobile Malware Attacks and Defense[\/amazon_link]. A wonderful technical and historical reference on mobile malware and other mobile threats, with an emphasis on forensic techniques applied to the different mobile platforms. It shines at its comprehensiveness, as it lists almost every technique, malware and software known as of its publishing date. The only shortcoming is that Android is not mentioned since the book is a bit&nbsp;dated.<span id=\"n4f12e964\"><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>All the recent news about the Android and iPhone smartphones storing geo-location data without the user\u2019s knowledge and consent are just the tip the iceberg of the very long history of the clash between the growing functionality of mobile phones and the unawareness of the userbase, and a omen of what\u2019s to come in&nbsp;the&nbsp;[\u2026]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"wp_typography_post_enhancements_disabled":false,"ngg_post_thumbnail":0},"categories":[11,6,3],"tags":[],"_links":{"self":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/709"}],"collection":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/comments?post=709"}],"version-history":[{"count":4,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/709\/revisions"}],"predecessor-version":[{"id":1648,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/posts\/709\/revisions\/1648"}],"wp:attachment":[{"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/media?parent=709"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/categories?post=709"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cerezo.name\/blog\/wp-json\/wp\/v2\/tags?post=709"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}