Back to Search
ISBN 9781518877322 is currently unpriced. Please contact us for pricing.
Available options are listed below:

Mobile Payment security analysis Types and Penetration Testing an Security Architecture: Mobile Payment security analysis and Penetration Testing , Pa

AUTHOR Hudaib, Adam Ali Zre
PUBLISHER Createspace Independent Publishing Platform (11/01/2015)
PRODUCT TYPE Paperback (Paperback)

Description
In this High professional Book with more than 360 references we discusses the different types of technologies used for mobile payment systems, such as: SMS, USSD, WAP, BLE, QR Code, Offline NFC, HCE, P2P-Paid, Cloud Based m-payment, Mobile Wallet. For every type of these payment mobile systems we will show the Security Architecture and Operations we will explain how every type is working and will discuss and analysis the possible security threats for every type also in General we will explain how these systems could be hacked by black hat attackers .we will provide recommendations and Best Policies in Practice to protect the mobile payment systems in addition to all of that we will go throw mobile payments penetration testing methods and Guidelines. The mobile cyber threats statistics will be also presented.
Show More
Product Format
Product Details
ISBN-13: 9781518877322
ISBN-10: 151887732X
Binding: Paperback or Softback (Trade Paperback (Us))
Content Language: English
More Product Details
Page Count: 166
Carton Quantity: 19
Product Dimensions: 8.50 x 0.43 x 11.00 inches
Weight: 1.21 pound(s)
Country of Origin: US
Subject Information
BISAC Categories
Computers | Security - Network Security
Descriptions, Reviews, Etc.
publisher marketing
In this High professional Book with more than 360 references we discusses the different types of technologies used for mobile payment systems, such as: SMS, USSD, WAP, BLE, QR Code, Offline NFC, HCE, P2P-Paid, Cloud Based m-payment, Mobile Wallet. For every type of these payment mobile systems we will show the Security Architecture and Operations we will explain how every type is working and will discuss and analysis the possible security threats for every type also in General we will explain how these systems could be hacked by black hat attackers .we will provide recommendations and Best Policies in Practice to protect the mobile payment systems in addition to all of that we will go throw mobile payments penetration testing methods and Guidelines. The mobile cyber threats statistics will be also presented.
Show More
Paperback