Mobile Security: a Pocket Guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2009
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (77 pages) |
ISBN: | 1849280207 1849280215 9781849280204 9781849280211 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043031490 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151120s2009 |||| o||u| ||||||eng d | ||
020 | |a 1849280207 |9 1-84928-020-7 | ||
020 | |a 1849280215 |9 1-84928-021-5 | ||
020 | |a 9781849280204 |9 978-1-84928-020-4 | ||
020 | |a 9781849280211 |9 978-1-84928-021-1 | ||
035 | |a (OCoLC)609854809 | ||
035 | |a (DE-599)BVBBV043031490 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Furnell, Steven |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile Security |b a Pocket Guide |
264 | 1 | |a Ely |b IT Governance Pub. |c 2009 | |
300 | |a 1 online resource (77 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources | |
505 | 8 | |a The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems | |
650 | 4 | |a Mobile computing / Security measures | |
650 | 4 | |a Wireless communication systems | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Mobile computing |x Security measures | |
650 | 4 | |a Wireless communication systems | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028456141 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175388008513536 |
---|---|
any_adam_object | |
author | Furnell, Steven |
author_facet | Furnell, Steven |
author_role | aut |
author_sort | Furnell, Steven |
author_variant | s f sf |
building | Verbundindex |
bvnumber | BV043031490 |
collection | ZDB-4-EBA |
contents | Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems |
ctrlnum | (OCoLC)609854809 (DE-599)BVBBV043031490 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02336nmm a2200469zc 4500</leader><controlfield tag="001">BV043031490</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280207</subfield><subfield code="9">1-84928-020-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280215</subfield><subfield code="9">1-84928-021-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280204</subfield><subfield code="9">978-1-84928-020-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280211</subfield><subfield code="9">978-1-84928-021-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)609854809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043031490</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile Security</subfield><subfield code="b">a Pocket Guide</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (77 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028456141</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043031490 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:15:29Z |
institution | BVB |
isbn | 1849280207 1849280215 9781849280204 9781849280211 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028456141 |
oclc_num | 609854809 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 online resource (77 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Furnell, Steven Verfasser aut Mobile Security a Pocket Guide Ely IT Governance Pub. 2009 1 online resource (77 pages) txt rdacontent c rdamedia cr rdacarrier Print version record Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems Mobile computing / Security measures Wireless communication systems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Mobile computing Security measures http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148 Aggregator Volltext |
spellingShingle | Furnell, Steven Mobile Security a Pocket Guide Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems Mobile computing / Security measures Wireless communication systems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Mobile computing Security measures |
title | Mobile Security a Pocket Guide |
title_auth | Mobile Security a Pocket Guide |
title_exact_search | Mobile Security a Pocket Guide |
title_full | Mobile Security a Pocket Guide |
title_fullStr | Mobile Security a Pocket Guide |
title_full_unstemmed | Mobile Security a Pocket Guide |
title_short | Mobile Security |
title_sort | mobile security a pocket guide |
title_sub | a Pocket Guide |
topic | Mobile computing / Security measures Wireless communication systems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Mobile computing Security measures |
topic_facet | Mobile computing / Security measures Wireless communication systems COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Mobile computing Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148 |
work_keys_str_mv | AT furnellsteven mobilesecurityapocketguide |