Mobile device security:
As mobile technologies mature, there is an increase in the use of mobile devices to access sensitive data. Unfortunately, security controls have not necessarily kept pace with the security risks that mobile devices can pose. In this course, the different types of mobile operating systems are discuss...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
United States
IEEE
2016
|
Schlagworte: | |
Online-Zugang: | FHN01 TUM01 |
Zusammenfassung: | As mobile technologies mature, there is an increase in the use of mobile devices to access sensitive data. Unfortunately, security controls have not necessarily kept pace with the security risks that mobile devices can pose. In this course, the different types of mobile operating systems are discussed. Additionally, the course will examine how data on mobile devices can be lost, stolen, and protected |
Beschreibung: | Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) |
Beschreibung: | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
ISBN: | 9781509005222 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047477360 | ||
003 | DE-604 | ||
005 | 20220217 | ||
007 | cr|uuu---uuuuu | ||
008 | 210921s2016 |||| o||u| ||||||eng d | ||
020 | |a 9781509005222 |9 978-1-5090-0522-2 | ||
035 | |a (ZDB-37-ICG)EDP458 | ||
035 | |a (OCoLC)1269386452 | ||
035 | |a (DE-599)BVBBV047477360 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-92 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Oriyano, Sean |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile device security |c Sean Oriyano |
264 | 1 | |a United States |b IEEE |c 2016 | |
300 | |a 1 Online-Resource (1 Videodatei, 60 Minuten) |b color illustrations | ||
336 | |b tdi |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) | ||
520 | |a As mobile technologies mature, there is an increase in the use of mobile devices to access sensitive data. Unfortunately, security controls have not necessarily kept pace with the security risks that mobile devices can pose. In this course, the different types of mobile operating systems are discussed. Additionally, the course will examine how data on mobile devices can be lost, stolen, and protected | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Privacy | |
650 | 4 | |a Access control | |
650 | 4 | |a Security | |
655 | 7 | |0 (DE-588)4017102-4 |a Film |2 gnd-content | |
912 | |a ZDB-37-ICG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032878921 | ||
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP458 |l FHN01 |p ZDB-37-ICG |x Verlag |3 Volltext | |
966 | e | |u https://ieeexplore.ieee.org/courses/details/EDP458 |l TUM01 |p ZDB-37-ICG |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182793415032832 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Oriyano, Sean |
author_facet | Oriyano, Sean |
author_role | aut |
author_sort | Oriyano, Sean |
author_variant | s o so |
building | Verbundindex |
bvnumber | BV047477360 |
collection | ZDB-37-ICG |
ctrlnum | (ZDB-37-ICG)EDP458 (OCoLC)1269386452 (DE-599)BVBBV047477360 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01766nmm a2200397zc 4500</leader><controlfield tag="001">BV047477360</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220217 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210921s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781509005222</subfield><subfield code="9">978-1-5090-0522-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-37-ICG)EDP458</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1269386452</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047477360</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile device security</subfield><subfield code="c">Sean Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">United States</subfield><subfield code="b">IEEE</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Resource (1 Videodatei, 60 Minuten)</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As mobile technologies mature, there is an increase in the use of mobile devices to access sensitive data. Unfortunately, security controls have not necessarily kept pace with the security risks that mobile devices can pose. In this course, the different types of mobile operating systems are discussed. Additionally, the course will examine how data on mobile devices can be lost, stolen, and protected</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4017102-4</subfield><subfield code="a">Film</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-ICG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032878921</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP458</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/courses/details/EDP458</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-37-ICG</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4017102-4 Film gnd-content |
genre_facet | Film |
id | DE-604.BV047477360 |
illustrated | Illustrated |
index_date | 2024-07-03T18:11:31Z |
indexdate | 2024-07-10T09:13:12Z |
institution | BVB |
isbn | 9781509005222 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032878921 |
oclc_num | 1269386452 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-92 |
owner_facet | DE-91 DE-BY-TUM DE-92 |
physical | 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations |
psigel | ZDB-37-ICG |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | IEEE |
record_format | marc |
spelling | Oriyano, Sean Verfasser aut Mobile device security Sean Oriyano United States IEEE 2016 1 Online-Resource (1 Videodatei, 60 Minuten) color illustrations tdi rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title screen (IEEE Xplore Digital Library, viewed November 18, 2020) As mobile technologies mature, there is an increase in the use of mobile devices to access sensitive data. Unfortunately, security controls have not necessarily kept pace with the security risks that mobile devices can pose. In this course, the different types of mobile operating systems are discussed. Additionally, the course will examine how data on mobile devices can be lost, stolen, and protected Computer security Privacy Access control Security (DE-588)4017102-4 Film gnd-content |
spellingShingle | Oriyano, Sean Mobile device security Computer security Privacy Access control Security |
subject_GND | (DE-588)4017102-4 |
title | Mobile device security |
title_auth | Mobile device security |
title_exact_search | Mobile device security |
title_exact_search_txtP | Mobile device security |
title_full | Mobile device security Sean Oriyano |
title_fullStr | Mobile device security Sean Oriyano |
title_full_unstemmed | Mobile device security Sean Oriyano |
title_short | Mobile device security |
title_sort | mobile device security |
topic | Computer security Privacy Access control Security |
topic_facet | Computer security Privacy Access control Security Film |
work_keys_str_mv | AT oriyanosean mobiledevicesecurity |