
Demonstrating how mobile devices can create a backdoor to security threats, this book details actions that can be taken to defend against these threats. It defines the concepts essential to understanding the security threats to contemporary mobile devices, and takes readers...