Top 10 Best Books on Mobile Security You Should Read

Top 10 Best Books on Mobile Security You Should ReadWith the large number of books about mobile security available online, choosing one that is helpful to you and your organization can be a difficult task. Solutions Review has taken the liberty of doing the research for you, having reviewed a multitude of these books. We’ve carefully selected the top books based on relevance, popularity, review ratings, publish date, and ability to add business value. Here they are in no particular order.

Wireless and Mobile Device Security

By Jim Doherty

Written by an industry expert, Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches.”

Mobile Security and Privacy: Advances, Challenges and Future Research Directions

By Man Ho Au and Raymond Choo

“Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security.”

Practical Mobile Forensics – Third Edition: A Hands-On Guide to Mastering Mobile Forensics for the iOS, Android, and the Windows Phone Platforms

By Rohit Tamma, Oleg Skulkin, Heather Mahalik, and Satish Bommisetty

“Covering up-to-date mobile platforms, this book focuses on teaching you the most recent techniques for investigating mobile devices. We delve into mobile forensics techniques for iOS 9-11 and Android 7-8 devices, and Windows 10. We will demonstrate the latest open source and commercial mobile forensics tools, enabling you to analyze and retrieve data effectively. You will learn how to introspect and retrieve data from the cloud, and document and prepare reports of your investigations.”

Mobile Security: How to Secure, Privatize, and Recover Your Devices

By Timothy Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, and Jaya Nampalli

“In this guide you will discover just how vulnerable unsecured devices can be, and explore effective methods of mobile device management and identity protection to ensure your data’s security. There will be special sections detailing extra precautions to ensure the safety of family members and how to secure your device for use at work.”

Android Security Internals: An In-Depth Guide to Android’s Security Architecture

By Nikolay Elenkov

“In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sys­tem. Elenkov describes Android security archi­tecture from the bottom up, delving into the imple­mentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.”

The Art of Invisibility

By Kevin Mitnick with Robert Vamosi

“In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you “the art of invisibility”–online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.”

Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety

By Eric Butow

“The iPhone and iPad are both widely used across businesses from Fortune 500 companies down to garage start-ups. All of these devices must have secure and monitorable ways to connect to the internet, store and transmit data without leaks, and even be managed in the event of a physical theft. Pro iOS Security and Forensics covers all these concerns as well as also offering tips for communicating with employees about the policies your business puts in place, why those policies are important, and how to follow them.”

Mobile Data Loss: Threats and Countermeasures

By Michael T. Raggo

“Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mindset to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviors. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key.”

Managing the Security of Mobile Devices in the Enterprise

By the National Institute of Standards and Technology

“This publication provides recommendations for selecting, implementing, and using centralized management technologies, and it explains the security concerns inherent in mobile device use and provides recommendations for securing mobile devices throughout their life cycles. The scope of this publication includes securing both organization-provided and personally-owned (bring your own device, BYOD) mobile devices.”

Android Security: Attacks and Defenses

By Anmol Misra and Abhishek Dubey

“Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues.”

Tess Hanna

Tess Hanna is an editor and writer at Solutions Review covering Backup and Disaster Recovery. She has a degree in English and Textual Studies from Syracuse University. You can contact her at thanna@solutionsreview.com