Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Hacking Mobile Phones 1st Edition

2.3 out of 5 stars 3 customer reviews
ISBN-13: 978-1598631067
ISBN-10: 1598631063
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
More Buying Choices
5 New from $113.43 14 Used from $0.01
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Excel2016ForDummiesVideo
Excel 2016 For Dummies Video Training
Discover what Excel can do for you with self-paced video lessons from For Dummies. Learn more.
click to open popover

Editorial Reviews

About the Author

Ankit Fadia is an independent computer security consultant based in Silicon Valley. He has authored several internationally best-selling books on numerous topics related to computer security, and he is a widely recognized computer security guru and cyberterrorism expert. Fadia provides customized cybersecurity training and consulting solutions to major clients all across North America, Asia, Australia, and the Middle East. He is also regularly invited by BBC Radio World News to share the latest updates on virus outbreaks, loopholes, and cybercrime trends. Recently, Fadia started his own computer security consulting and mobile phone solutions company based in Malaysia, with operations all across the Asian Pacific region.
NO_CONTENT_IN_FEATURE

The latest book club pick from Oprah
"The Underground Railroad" by Colson Whitehead is a magnificent novel chronicling a young slave's adventures as she makes a desperate bid for freedom in the antebellum South. See more

Product Details

  • Paperback: 248 pages
  • Publisher: Course Technology PTR; 1 edition (December 7, 2005)
  • Language: English
  • ISBN-10: 1598631063
  • ISBN-13: 978-1598631067
  • Product Dimensions: 9.1 x 7.4 x 0.8 inches
  • Shipping Weight: 1.3 pounds
  • Average Customer Review: 2.3 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #5,005,957 in Books (See Top 100 in Books)

Important Information

Ingredients
Example Ingredients

Directions
Example Directions

Customer Reviews

5 star
33%
4 star
0%
3 star
0%
2 star
0%
1 star
67%
See all 3 customer reviews
Share your thoughts with other customers

Top Customer Reviews

By Abhinav Vaid on December 9, 2006
Format: Paperback
1. Pathetic and wrong information.

2. Just the last page talks about GSM/CDMA stuff, leaving the core (vary basic functionality). Interesting part is that there have been tonnes of references towards finding IMEI numbering which is not applicable in the case of CDMA based handsets. Even that has not been clarified. So if I did not know it, I would still be continuing using *#06# in CDMA handsets, Oh !!!

4. There are no probabilities in Security, either that is high state or low, leaving absolutely no scope to go to tri-state mode.

5. No mention of intented audiences: Frankly speaking for technical people, its totally dump.

6. The author has used the word "basically" in every other sentence and overall usage has gone in thousands.
Comment 10 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
mr ankt fadia back again wid some more cut n paste tutorials n once again has he convinced the publisher to have his book published wat a joke.dis 17 yr ol button clicking script kiddie hacker aka security guru needs to stop copying garbage tutorials n then claim that their his own .wat a fake b$$$$$d,so is ankit fadia really the great hacker who he claims to be heres a quote from the l33t hacker EMPORER of the (IHC)

"Ankit fadia.ethical hacker? neither is he ethical nor is he a hacker !!!1 yr ago he begged and bragged to a Indian hacker

about his fake VSNL hacking skill !!its another matter , he was kicked out..lol" <<<<<irc

i have nothing else to say this guy except dat dis guy is a total reject a loser

now for the fun part

VULNERABILITIES BY ANKIT FADIA = 0

BUGTRAQ ID'S BY ANKIT FADIA = 0

HACKING/ SECURITY TOOL BY ANKIT FADIA = 0

SOFTWARE / CRYPTOGRAPHY PATENTS BY ANKIT FADIA = 0

ALGORYTHMS BY ANKIT FADIA = 0

ANY OFFICIAL CITATION BY FBI/CIA/CBI FOR ANKIT = 0

ANY CONFIRMATION OF HIS SELF-CLAIMS = 0

ANY CONFIRMATION OF HIM DECRYPTING OSAMA MSG = 0

ANY TECHNICAL TUTORIAL OR BOOK BY ANKIT FADIA = 0

ANY ORGINALITY IN ANKITS TUTORIALS OR BOOKS = 0

SKILL LEVEL OF ANKIT FADIA = -0

PLAGIARIZED BOOKS BY ANKIT FADIA & INDIAN PUBLISHER =

1 OR 2 OR 3, THE F***er CO=AUTHORED SOME BOOK AND SAYS

ITS HIS AT FEW PLACES HE'S A moron.

newayz dats it peace to the real,Shoutouts EMPORER,c0bRA,nirvana

R00t access

ps:amazon customers dun waste ya hard earned money on dis crap.keep looking im sure ull find better books in the market but dun buy this one.
Comment 21 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
We are accustomed to thinking of a telephone as a private device that we talk into and the voice comes out of the other end. Most people fail to realize that a mobile or cell phone is really a radio. When we talk, we are really transmitting what we say to a radio receiver somewhere. What we send out into the air, someone else can receive, someone who we just might not want to hear what we are saying. Also most people think of a cell phone as a telephone. But down inside, it is really a fairly powerful computer. Further, it is a computer that, by definition is connected to a communications medium.

All this means that cell phone security is a growing problem. Just like with any other computer connected to a phone line:

1. your phone is susceptible to being broken into and any information stored there stolen;

2. your phone is susceptible to viruses, trojans and all the other bad software that people might want to put on it;

3. your phone has built in features that the manufacturer keeps secret for its own use by service personnel and the like.

This book covers these areas in a casually written lively style. The book is broken down into two major sections. First is a general description area that is applicable to virtually all phones. Then there is a manufacturer by manufacturer breakdown of phones giving special points about each of them.
1 Comment 6 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Pages with Related Products. See and discover other items: ebay books