Programming Books C Java PHP Python Learn more Browse Programming Books
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Hacking Mobile Phones Paperback – December 7, 2005

ISBN-13: 978-1598631067 ISBN-10: 1598631063 Edition: 1st

7 New from $93.99 7 Used from $9.10
Amazon Price New from Used from
Paperback
"Please retry"
$93.99 $9.10

Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


NO_CONTENT_IN_FEATURE

Shop the new tech.book(store)
New! Introducing the tech.book(store), a hub for Software Developers and Architects, Networking Administrators, TPMs, and other technology professionals to find highly-rated and highly-relevant career resources. Shop books on programming and big data, or read this week's blog posts by authors and thought-leaders in the tech industry. > Shop now

Product Details

  • Paperback: 248 pages
  • Publisher: Course Technology PTR; 1 edition (December 7, 2005)
  • Language: English
  • ISBN-10: 1598631063
  • ISBN-13: 978-1598631067
  • Product Dimensions: 7.1 x 9 inches
  • Shipping Weight: 1.3 pounds
  • Average Customer Review: 2.3 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #3,257,641 in Books (See Top 100 in Books)

Editorial Reviews

About the Author

Ankit Fadia is an independent computer security consultant based in Silicon Valley. He has authored several internationally best-selling books on numerous topics related to computer security, and he is a widely recognized computer security guru and cyberterrorism expert. Fadia provides customized cybersecurity training and consulting solutions to major clients all across North America, Asia, Australia, and the Middle East. He is also regularly invited by BBC Radio World News to share the latest updates on virus outbreaks, loopholes, and cybercrime trends. Recently, Fadia started his own computer security consulting and mobile phone solutions company based in Malaysia, with operations all across the Asian Pacific region.

More About the Author

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

2.3 out of 5 stars
5 star
1
4 star
0
3 star
0
2 star
0
1 star
2
See all 3 customer reviews
Share your thoughts with other customers

Most Helpful Customer Reviews

10 of 15 people found the following review helpful By Abhinav Vaid on December 9, 2006
Format: Paperback
1. Pathetic and wrong information.

2. Just the last page talks about GSM/CDMA stuff, leaving the core (vary basic functionality). Interesting part is that there have been tonnes of references towards finding IMEI numbering which is not applicable in the case of CDMA based handsets. Even that has not been clarified. So if I did not know it, I would still be continuing using *#06# in CDMA handsets, Oh !!!

4. There are no probabilities in Security, either that is high state or low, leaving absolutely no scope to go to tri-state mode.

5. No mention of intented audiences: Frankly speaking for technical people, its totally dump.

6. The author has used the word "basically" in every other sentence and overall usage has gone in thousands.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
20 of 32 people found the following review helpful By chemical burned dc on April 13, 2006
Format: Paperback
mr ankt fadia back again wid some more cut n paste tutorials n once again has he convinced the publisher to have his book published wat a joke.dis 17 yr ol button clicking script kiddie hacker aka security guru needs to stop copying garbage tutorials n then claim that their his own .wat a fake b$$$$$d,so is ankit fadia really the great hacker who he claims to be heres a quote from the l33t hacker EMPORER of the (IHC)

"Ankit fadia.ethical hacker? neither is he ethical nor is he a hacker !!!1 yr ago he begged and bragged to a Indian hacker

about his fake VSNL hacking skill !!its another matter , he was kicked out..lol" <<<<<irc

i have nothing else to say this guy except dat dis guy is a total reject a loser

now for the fun part

VULNERABILITIES BY ANKIT FADIA = 0

BUGTRAQ ID'S BY ANKIT FADIA = 0

HACKING/ SECURITY TOOL BY ANKIT FADIA = 0

SOFTWARE / CRYPTOGRAPHY PATENTS BY ANKIT FADIA = 0

ALGORYTHMS BY ANKIT FADIA = 0

ANY OFFICIAL CITATION BY FBI/CIA/CBI FOR ANKIT = 0

ANY CONFIRMATION OF HIS SELF-CLAIMS = 0

ANY CONFIRMATION OF HIM DECRYPTING OSAMA MSG = 0

ANY TECHNICAL TUTORIAL OR BOOK BY ANKIT FADIA = 0

ANY ORGINALITY IN ANKITS TUTORIALS OR BOOKS = 0

SKILL LEVEL OF ANKIT FADIA = -0

PLAGIARIZED BOOKS BY ANKIT FADIA & INDIAN PUBLISHER =

1 OR 2 OR 3, THE F***er CO=AUTHORED SOME BOOK AND SAYS

ITS HIS AT FEW PLACES HE'S A moron.

newayz dats it peace to the real,Shoutouts EMPORER,c0bRA,nirvana

R00t access

ps:amazon customers dun waste ya hard earned money on dis crap.keep looking im sure ull find better books in the market but dun buy this one.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 19 people found the following review helpful By John Matlock on January 22, 2006
Format: Paperback
We are accustomed to thinking of a telephone as a private device that we talk into and the voice comes out of the other end. Most people fail to realize that a mobile or cell phone is really a radio. When we talk, we are really transmitting what we say to a radio receiver somewhere. What we send out into the air, someone else can receive, someone who we just might not want to hear what we are saying. Also most people think of a cell phone as a telephone. But down inside, it is really a fairly powerful computer. Further, it is a computer that, by definition is connected to a communications medium.

All this means that cell phone security is a growing problem. Just like with any other computer connected to a phone line:

1. your phone is susceptible to being broken into and any information stored there stolen;

2. your phone is susceptible to viruses, trojans and all the other bad software that people might want to put on it;

3. your phone has built in features that the manufacturer keeps secret for its own use by service personnel and the like.

This book covers these areas in a casually written lively style. The book is broken down into two major sections. First is a general description area that is applicable to virtually all phones. Then there is a manufacturer by manufacturer breakdown of phones giving special points about each of them.
1 Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Search