Mobile Security: a Pocket Guide
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely
IT Governance Pub.
2009
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (77 pages) |
ISBN: | 9781849280211 1849280215 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045348839 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2009 |||| o||u| ||||||eng d | ||
020 | |a 9781849280211 |9 978-1-84928-021-1 | ||
020 | |a 1849280215 |9 1-84928-021-5 | ||
035 | |a (ZDB-4-ITC)ocn609854809 | ||
035 | |a (OCoLC)609854809 | ||
035 | |a (DE-599)BVBBV045348839 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Furnell, Steven |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile Security |b a Pocket Guide |
264 | 1 | |a Ely |b IT Governance Pub. |c 2009 | |
300 | |a 1 online resource (77 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Wireless communication systems |2 fast | |
650 | 4 | |a Mobile computing |x Security measures |a Wireless communication systems | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781849280204 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735493 |
Datensatz im Suchindex
_version_ | 1804179172241702912 |
---|---|
any_adam_object | |
author | Furnell, Steven |
author_facet | Furnell, Steven |
author_role | aut |
author_sort | Furnell, Steven |
author_variant | s f sf |
building | Verbundindex |
bvnumber | BV045348839 |
collection | ZDB-4-ITC |
contents | The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems |
ctrlnum | (ZDB-4-ITC)ocn609854809 (OCoLC)609854809 (DE-599)BVBBV045348839 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01548nmm a2200385zc 4500</leader><controlfield tag="001">BV045348839</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280211</subfield><subfield code="9">978-1-84928-021-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280215</subfield><subfield code="9">1-84928-021-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn609854809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)609854809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348839</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile Security</subfield><subfield code="b">a Pocket Guide</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (77 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781849280204</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735493</subfield></datafield></record></collection> |
id | DE-604.BV045348839 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:38Z |
institution | BVB |
isbn | 9781849280211 1849280215 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735493 |
oclc_num | 609854809 |
open_access_boolean | |
physical | 1 online resource (77 pages) |
psigel | ZDB-4-ITC |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Furnell, Steven Verfasser aut Mobile Security a Pocket Guide Ely IT Governance Pub. 2009 1 online resource (77 pages) txt rdacontent c rdamedia cr rdacarrier Print version record The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems fast Mobile computing Security measures Wireless communication systems Erscheint auch als Druck-Ausgabe 9781849280204 |
spellingShingle | Furnell, Steven Mobile Security a Pocket Guide The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems fast Mobile computing Security measures Wireless communication systems |
title | Mobile Security a Pocket Guide |
title_auth | Mobile Security a Pocket Guide |
title_exact_search | Mobile Security a Pocket Guide |
title_full | Mobile Security a Pocket Guide |
title_fullStr | Mobile Security a Pocket Guide |
title_full_unstemmed | Mobile Security a Pocket Guide |
title_short | Mobile Security |
title_sort | mobile security a pocket guide |
title_sub | a Pocket Guide |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems fast Mobile computing Security measures Wireless communication systems |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Wireless communication systems Mobile computing Security measures Wireless communication systems |
work_keys_str_mv | AT furnellsteven mobilesecurityapocketguide |