Mobile Security: How to secure, privatize and recover your devices
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2013
|
Schlagworte: | |
Beschreibung: | Print version record. - Encryption on iOS.. - Includes index |
Beschreibung: | 1 online resource (242 pages) |
ISBN: | 9781849693615 1849693617 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350264 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781849693615 |9 978-1-84969-361-5 | ||
020 | |a 1849693617 |9 1-84969-361-7 | ||
035 | |a (ZDB-4-ITC)ocn858229362 | ||
035 | |a (OCoLC)858229362 | ||
035 | |a (DE-599)BVBBV045350264 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Speed, Tim |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile Security |b How to secure, privatize and recover your devices |c Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli |
264 | 1 | |a Birmingham |b Packt Publishing |c 2013 | |
300 | |a 1 online resource (242 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record. - Encryption on iOS.. - Includes index | ||
505 | 8 | |a Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 4 | |a Cell phones |x Security measures |a Pocket computers |x Security measures |a Wireless communication systems |x Security measures | |
700 | 1 | |a Nykamp, Darla |e Sonstige |4 oth | |
700 | 1 | |a Heiser, Mari |e Sonstige |4 oth | |
700 | 1 | |a Anderson, Joseph |e Sonstige |4 oth | |
700 | 1 | |a Nampalli, Jaya |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Speed, Timothy |t Mobile Security : How to secure, privatize and recover your devices |d Birmingham : Packt Publishing, 2013 |z 9781849693608 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736917 |
Datensatz im Suchindex
_version_ | 1804179174777159680 |
---|---|
any_adam_object | |
author | Speed, Tim |
author_facet | Speed, Tim |
author_role | aut |
author_sort | Speed, Tim |
author_variant | t s ts |
building | Verbundindex |
bvnumber | BV045350264 |
collection | ZDB-4-ITC |
contents | Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online |
ctrlnum | (ZDB-4-ITC)ocn858229362 (OCoLC)858229362 (DE-599)BVBBV045350264 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02187nmm a2200433zc 4500</leader><controlfield tag="001">BV045350264</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849693615</subfield><subfield code="9">978-1-84969-361-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849693617</subfield><subfield code="9">1-84969-361-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn858229362</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858229362</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350264</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile Security</subfield><subfield code="b">How to secure, privatize and recover your devices</subfield><subfield code="c">Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (242 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record. - Encryption on iOS.. - Includes index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cell phones</subfield><subfield code="x">Security measures</subfield><subfield code="a">Pocket computers</subfield><subfield code="x">Security measures</subfield><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nykamp, Darla</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heiser, Mari</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anderson, Joseph</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nampalli, Jaya</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Speed, Timothy</subfield><subfield code="t">Mobile Security : How to secure, privatize and recover your devices</subfield><subfield code="d">Birmingham : Packt Publishing, 2013</subfield><subfield code="z">9781849693608</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736917</subfield></datafield></record></collection> |
id | DE-604.BV045350264 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:41Z |
institution | BVB |
isbn | 9781849693615 1849693617 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736917 |
oclc_num | 858229362 |
open_access_boolean | |
physical | 1 online resource (242 pages) |
psigel | ZDB-4-ITC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing |
record_format | marc |
spelling | Speed, Tim Verfasser aut Mobile Security How to secure, privatize and recover your devices Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli Birmingham Packt Publishing 2013 1 online resource (242 pages) txt rdacontent c rdamedia cr rdacarrier Print version record. - Encryption on iOS.. - Includes index Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems / Security measures fast Cell phones Security measures Pocket computers Security measures Wireless communication systems Security measures Nykamp, Darla Sonstige oth Heiser, Mari Sonstige oth Anderson, Joseph Sonstige oth Nampalli, Jaya Sonstige oth Erscheint auch als Druck-Ausgabe Speed, Timothy Mobile Security : How to secure, privatize and recover your devices Birmingham : Packt Publishing, 2013 9781849693608 |
spellingShingle | Speed, Tim Mobile Security How to secure, privatize and recover your devices Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems / Security measures fast Cell phones Security measures Pocket computers Security measures Wireless communication systems Security measures |
title | Mobile Security How to secure, privatize and recover your devices |
title_auth | Mobile Security How to secure, privatize and recover your devices |
title_exact_search | Mobile Security How to secure, privatize and recover your devices |
title_full | Mobile Security How to secure, privatize and recover your devices Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli |
title_fullStr | Mobile Security How to secure, privatize and recover your devices Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli |
title_full_unstemmed | Mobile Security How to secure, privatize and recover your devices Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli |
title_short | Mobile Security |
title_sort | mobile security how to secure privatize and recover your devices |
title_sub | How to secure, privatize and recover your devices |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems / Security measures fast Cell phones Security measures Pocket computers Security measures Wireless communication systems Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Wireless communication systems / Security measures Cell phones Security measures Pocket computers Security measures Wireless communication systems Security measures |
work_keys_str_mv | AT speedtim mobilesecurityhowtosecureprivatizeandrecoveryourdevices AT nykampdarla mobilesecurityhowtosecureprivatizeandrecoveryourdevices AT heisermari mobilesecurityhowtosecureprivatizeandrecoveryourdevices AT andersonjoseph mobilesecurityhowtosecureprivatizeandrecoveryourdevices AT nampallijaya mobilesecurityhowtosecureprivatizeandrecoveryourdevices |