Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
301
Chapter 25
Cell Phone Protocols
andOperating Systems
*
Eamon P. Doherty
e cell phone originally was a simple telecommunication device that was only used to make calls.
e operating system was originally an embedded system with a simple interface that allowed
people to conveniently operate the hardware, namely the phone’s keypad, to make or receive calls.
From the time the cell phone was invented until the early 1990s, it was only for making and
receiving calls. Phones such as the Motorola D520 that was announced in 1998 were part of a
widely accepted trend of new cell phones that allowed for SMS messages. e operating systems
had to become ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498