Mobile malware attacks and defense:
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code...
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Burlington, MA
Syngress/Elsevier
© 2009
|
Schlagworte: | |
Online-Zugang: | FLA01 Volltext |
Zusammenfassung: | Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xxv, 409 pages) illustrations |
ISBN: | 9780080949192 0080949193 1282169335 9781282169333 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125077 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2009 |||| o||u| ||||||eng d | ||
015 | |a GBB6H2444 |2 dnb | ||
015 | |a GBA8B9928 |2 dnb | ||
020 | |a 9780080949192 |9 978-0-08-094919-2 | ||
020 | |a 0080949193 |9 0-08-094919-3 | ||
020 | |a 1282169335 |9 1-282-16933-5 | ||
020 | |a 9781282169333 |9 978-1-282-16933-3 | ||
035 | |a (ZDB-33-ESD)ocn318353699 | ||
035 | |a (OCoLC)318353699 | ||
035 | |a (DE-599)BVBBV046125077 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Mobile malware attacks and defense |c Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others] |
264 | 1 | |a Burlington, MA |b Syngress/Elsevier |c © 2009 | |
300 | |a 1 online resource (xxv, 409 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer crimes |2 fast | |
650 | 7 | |a Computer crimes / Prevention |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 4 | |a Cell phone systems |x Security measures | |
650 | 4 | |a Mobile communication systems |x Security measures | |
650 | 4 | |a Mobile computing |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Computer crimes |v Case studies | |
650 | 4 | |a Hackers | |
650 | 4 | |a Wireless Internet |x Security measures | |
655 | 7 | |0 (DE-588)4522595-3 |a Fallstudiensammlung |2 gnd-content | |
700 | 1 | |a Dunham, Ken |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597492981 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597492980 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597492980 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505531 | ||
966 | e | |u http://www.sciencedirect.com/science/book/9781597492980 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180443827798016 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV046125077 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn318353699 (OCoLC)318353699 (DE-599)BVBBV046125077 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02628nmm a2200577zc 4500</leader><controlfield tag="001">BV046125077</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6H2444</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA8B9928</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080949192</subfield><subfield code="9">978-0-08-094919-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080949193</subfield><subfield code="9">0-08-094919-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282169335</subfield><subfield code="9">1-282-16933-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282169333</subfield><subfield code="9">978-1-282-16933-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn318353699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)318353699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125077</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile malware attacks and defense</subfield><subfield code="c">Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">© 2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxv, 409 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cell phone systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dunham, Ken</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597492981</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597492980</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492980</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505531</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597492980</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4522595-3 Fallstudiensammlung gnd-content |
genre_facet | Fallstudiensammlung |
id | DE-604.BV046125077 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:35:51Z |
institution | BVB |
isbn | 9780080949192 0080949193 1282169335 9781282169333 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505531 |
oclc_num | 318353699 |
open_access_boolean | |
physical | 1 online resource (xxv, 409 pages) illustrations |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Syngress/Elsevier |
record_format | marc |
spelling | Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others] Burlington, MA Syngress/Elsevier © 2009 1 online resource (xxv, 409 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer crimes / Prevention fast Hackers fast Cell phone systems Security measures Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Computer crimes Case studies Hackers Wireless Internet Security measures (DE-588)4522595-3 Fallstudiensammlung gnd-content Dunham, Ken Sonstige oth Erscheint auch als Druck-Ausgabe 1597492981 Erscheint auch als Druck-Ausgabe 9781597492980 http://www.sciencedirect.com/science/book/9781597492980 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Mobile malware attacks and defense COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer crimes / Prevention fast Hackers fast Cell phone systems Security measures Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Computer crimes Case studies Hackers Wireless Internet Security measures |
subject_GND | (DE-588)4522595-3 |
title | Mobile malware attacks and defense |
title_auth | Mobile malware attacks and defense |
title_exact_search | Mobile malware attacks and defense |
title_full | Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others] |
title_fullStr | Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others] |
title_full_unstemmed | Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others] |
title_short | Mobile malware attacks and defense |
title_sort | mobile malware attacks and defense |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer crimes fast Computer crimes / Prevention fast Hackers fast Cell phone systems Security measures Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Computer crimes Case studies Hackers Wireless Internet Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer crimes Computer crimes / Prevention Hackers Cell phone systems Security measures Mobile communication systems Security measures Mobile computing Security measures Computer crimes Prevention Computer crimes Case studies Wireless Internet Security measures Fallstudiensammlung |
url | http://www.sciencedirect.com/science/book/9781597492980 |
work_keys_str_mv | AT dunhamken mobilemalwareattacksanddefense |