Skip to Content
Wireless and Mobile Device Security, 2nd Edition
book

Wireless and Mobile Device Security, 2nd Edition

by Jim Doherty
March 2021
Intermediate to advanced content levelIntermediate to advanced
400 pages
14h 24m
English
Jones & Bartlett Learning
Content preview from Wireless and Mobile Device Security, 2nd Edition
decorative

© Cherezoff/Shutterstock

CHAPTER 14

Fingerprinting Mobile Devices

The process of identifying a device on a network (or the user behind the device) is called fingerprinting. As the name suggests, the process involves identifying some set of characteristics that uniquely identifies one device or user.

This chapter looks at the fingerprinting of mobile devices both directly (that is, devices connecting to a network) and indirectly (that is, devices connecting to one or more websites). Given the nature of mobile devices, you’ll find that the methods used to fingerprint stationary PCs do not work so well on mobile devices. However, some characteristics ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Wireless and Mobile Device Security

Wireless and Mobile Device Security

Jim Doherty
Mobile Security and Privacy

Mobile Security and Privacy

Man Ho Au, Raymond Choo

Publisher Resources

ISBN: 9781284211733