Mobile malware attacks and defense:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress/Elsevier
c2009
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (xxv, 409 p.) |
ISBN: | 9780080949192 0080949193 9781597492980 1597492981 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042305290 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2009 |||| o||u| ||||||eng d | ||
020 | |a 9780080949192 |c electronic bk. |9 978-0-08-094919-2 | ||
020 | |a 0080949193 |c electronic bk. |9 0-08-094919-3 | ||
020 | |a 9781597492980 |9 978-1-59749-298-0 | ||
020 | |a 1597492981 |9 1-59749-298-1 | ||
035 | |a (OCoLC)318353699 | ||
035 | |a (DE-599)BVBBV042305290 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Mobile malware attacks and defense |c Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] |
264 | 1 | |a Burlington, MA |b Syngress/Elsevier |c c2009 | |
300 | |a 1 Online-Ressource (xxv, 409 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices | ||
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Cell phone systems |x Security measures | |
650 | 4 | |a Mobile communication systems |x Security measures | |
650 | 4 | |a Mobile computing |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Computer crimes |v Case studies | |
650 | 4 | |a Hackers | |
650 | 4 | |a Wireless Internet |x Security measures | |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
700 | 1 | |a Dunham, Ken |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597492980 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027742282 |
Datensatz im Suchindex
_version_ | 1804152888240373760 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV042305290 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)318353699 (DE-599)BVBBV042305290 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02060nmm a2200469zc 4500</leader><controlfield tag="001">BV042305290</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080949192</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-094919-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080949193</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-094919-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597492980</subfield><subfield code="9">978-1-59749-298-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597492981</subfield><subfield code="9">1-59749-298-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)318353699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042305290</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile malware attacks and defense</subfield><subfield code="c">Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">c2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxv, 409 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cell phone systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dunham, Ken</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492980</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027742282</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV042305290 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:17:52Z |
institution | BVB |
isbn | 9780080949192 0080949193 9781597492980 1597492981 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027742282 |
oclc_num | 318353699 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (xxv, 409 p.) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Syngress/Elsevier |
record_format | marc |
spelling | Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] Burlington, MA Syngress/Elsevier c2009 1 Online-Ressource (xxv, 409 p.) txt rdacontent c rdamedia cr rdacarrier Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices Includes bibliographical references and index Cell phone systems Security measures Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Computer crimes Case studies Hackers Wireless Internet Security measures (DE-588)4522595-3 Fallstudiensammlung gnd-content Dunham, Ken Sonstige oth http://www.sciencedirect.com/science/book/9781597492980 Verlag Volltext |
spellingShingle | Mobile malware attacks and defense Cell phone systems Security measures Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Computer crimes Case studies Hackers Wireless Internet Security measures |
subject_GND | (DE-588)4522595-3 |
title | Mobile malware attacks and defense |
title_auth | Mobile malware attacks and defense |
title_exact_search | Mobile malware attacks and defense |
title_full | Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] |
title_fullStr | Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] |
title_full_unstemmed | Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] |
title_short | Mobile malware attacks and defense |
title_sort | mobile malware attacks and defense |
topic | Cell phone systems Security measures Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Computer crimes Case studies Hackers Wireless Internet Security measures |
topic_facet | Cell phone systems Security measures Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Computer crimes Case studies Hackers Wireless Internet Security measures Fallstudiensammlung |
url | http://www.sciencedirect.com/science/book/9781597492980 |
work_keys_str_mv | AT dunhamken mobilemalwareattacksanddefense |