Mobile Security :: How to secure, privatize and recover your devices /
Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , , , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2013.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online. |
Beschreibung: | Encryption on iOS. Includes index. |
Beschreibung: | 1 online resource (242 pages) |
ISBN: | 9781849693615 1849693617 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn858229362 | ||
003 | OCoLC | ||
005 | 20250103110447.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 130914s2013 enk o 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d YDXCP |d N$T |d IUL |d OCLCO |d OCLCQ |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d FEM |d JBG |d AGLDB |d ICA |d ZCU |d MERUC |d OCLCQ |d D6H |d OCLCF |d VTS |d ICG |d OCLCQ |d STF |d DKC |d AU@ |d OCLCQ |d UKAHL |d OCLCQ |d K6U |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d UEJ |d OCLCO |d OCLCQ |d UKKRT | ||
019 | |a 968048685 |a 969028056 |a 994452628 | ||
020 | |a 9781849693615 |q (electronic bk.) | ||
020 | |a 1849693617 |q (electronic bk.) | ||
035 | |a (OCoLC)858229362 |z (OCoLC)968048685 |z (OCoLC)969028056 |z (OCoLC)994452628 | ||
050 | 4 | |a TK5103.2 .S384 2013 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Speed, Tim. |1 https://id.oclc.org/worldcat/entity/E39PCjKTgPmCm4McBq9vjX9Fcd |0 http://id.loc.gov/authorities/names/nb2001018757 | |
245 | 1 | 0 | |a Mobile Security : |b How to secure, privatize and recover your devices / |c Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli. |
260 | |a Birmingham : |b Packt Publishing, |c 2013. | ||
300 | |a 1 online resource (242 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |2 rda | ||
588 | 0 | |a Print version record. | |
505 | 0 | 0 | |t Living in a mobile world -- |t Users and mobile device management -- |t Privacy : small word, big consequences -- |t Mobile and social : the threats you should know about -- |t Protecting your mobile devices -- |t Support and warranty insurance -- |t Baby boomers, teens, and tweens -- |t Getting your life back after you've been hacked -- |g Appendix A. |t IBM notes traveler -- |g Appendix B. |t Mobile device management -- |g Appendix C. |t Tips to help you protect your mobile device -- |g Appendix D. |t Mobile Acceptable Use Policy template -- |g Appendix E. |t The history of social networking, the Internet, and smartphones. |
500 | |a Encryption on iOS. | ||
500 | |a Includes index. | ||
520 | |a Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online. | ||
650 | 0 | |a Cell phones |x Security measures. | |
650 | 0 | |a Pocket computers |x Security measures. | |
650 | 0 | |a Wireless communication systems |x Security measures. | |
650 | 6 | |a Ordinateurs de poche |x Sécurité |x Mesures. | |
650 | 6 | |a Transmission sans fil |x Sécurité |x Mesures. | |
650 | 6 | |a Téléphones cellulaires |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Wireless communication systems |x Security measures |2 fast | |
700 | 1 | |a Nykamp, Darla. |1 https://id.oclc.org/worldcat/entity/E39PCjxXpj9dBMy4Bp4BvctvVC |0 http://id.loc.gov/authorities/names/no2014050966 | |
700 | 1 | |a Heiser, Mari. |1 https://id.oclc.org/worldcat/entity/E39PCjJQ66hkPHFbQckcckgQxC |0 http://id.loc.gov/authorities/names/no2014050979 | |
700 | 1 | |a Anderson, Joseph. |1 https://id.oclc.org/worldcat/entity/E39PCjMkXDcC6gDvB8rjmMk7HC |0 http://id.loc.gov/authorities/names/no2014050963 | |
700 | 1 | |a Nampalli, Jaya. |1 https://id.oclc.org/worldcat/entity/E39PCjFkF6M9DhGgdvhR7jq3V3 |0 http://id.loc.gov/authorities/names/no2014050984 | |
758 | |i has work: |a Mobile Security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGw9PRfy9CB4gFQw3qKcRq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Speed, Timothy. |t Mobile Security : How to secure, privatize and recover your devices. |d Birmingham : Packt Publishing, ©2013 |z 9781849693608 |
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=639456 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=639456 |3 Volltext |
938 | |a Kortext |b KTXT |n 121291 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH26851111 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL1336386 | ||
938 | |a EBSCOhost |b EBSC |n 639456 | ||
938 | |a YBP Library Services |b YANK |n 11136484 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn858229362 |
---|---|
_version_ | 1829094969632096256 |
adam_text | |
any_adam_object | |
author | Speed, Tim |
author2 | Nykamp, Darla Heiser, Mari Anderson, Joseph Nampalli, Jaya |
author2_role | |
author2_variant | d n dn m h mh j a ja j n jn |
author_GND | http://id.loc.gov/authorities/names/nb2001018757 http://id.loc.gov/authorities/names/no2014050966 http://id.loc.gov/authorities/names/no2014050979 http://id.loc.gov/authorities/names/no2014050963 http://id.loc.gov/authorities/names/no2014050984 |
author_facet | Speed, Tim Nykamp, Darla Heiser, Mari Anderson, Joseph Nampalli, Jaya |
author_role | |
author_sort | Speed, Tim |
author_variant | t s ts |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.2 .S384 2013 |
callnumber-search | TK5103.2 .S384 2013 |
callnumber-sort | TK 45103.2 S384 42013 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Living in a mobile world -- Users and mobile device management -- Privacy : small word, big consequences -- Mobile and social : the threats you should know about -- Protecting your mobile devices -- Support and warranty insurance -- Baby boomers, teens, and tweens -- Getting your life back after you've been hacked -- IBM notes traveler -- Mobile device management -- Tips to help you protect your mobile device -- Mobile Acceptable Use Policy template -- The history of social networking, the Internet, and smartphones. |
ctrlnum | (OCoLC)858229362 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04509cam a2200661 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn858229362</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20250103110447.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">130914s2013 enk o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">YDXCP</subfield><subfield code="d">N$T</subfield><subfield code="d">IUL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">FEM</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICA</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">UEJ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKKRT</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">968048685</subfield><subfield code="a">969028056</subfield><subfield code="a">994452628</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849693615</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849693617</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)858229362</subfield><subfield code="z">(OCoLC)968048685</subfield><subfield code="z">(OCoLC)969028056</subfield><subfield code="z">(OCoLC)994452628</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5103.2 .S384 2013</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Speed, Tim.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKTgPmCm4McBq9vjX9Fcd</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2001018757</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile Security :</subfield><subfield code="b">How to secure, privatize and recover your devices /</subfield><subfield code="c">Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2013.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (242 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Living in a mobile world --</subfield><subfield code="t">Users and mobile device management --</subfield><subfield code="t">Privacy : small word, big consequences --</subfield><subfield code="t">Mobile and social : the threats you should know about --</subfield><subfield code="t">Protecting your mobile devices --</subfield><subfield code="t">Support and warranty insurance --</subfield><subfield code="t">Baby boomers, teens, and tweens --</subfield><subfield code="t">Getting your life back after you've been hacked --</subfield><subfield code="g">Appendix A.</subfield><subfield code="t">IBM notes traveler --</subfield><subfield code="g">Appendix B.</subfield><subfield code="t">Mobile device management --</subfield><subfield code="g">Appendix C.</subfield><subfield code="t">Tips to help you protect your mobile device --</subfield><subfield code="g">Appendix D.</subfield><subfield code="t">Mobile Acceptable Use Policy template --</subfield><subfield code="g">Appendix E.</subfield><subfield code="t">The history of social networking, the Internet, and smartphones.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Encryption on iOS.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cell phones</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Pocket computers</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Ordinateurs de poche</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Transmission sans fil</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Téléphones cellulaires</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nykamp, Darla.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjxXpj9dBMy4Bp4BvctvVC</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2014050966</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heiser, Mari.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjJQ66hkPHFbQckcckgQxC</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2014050979</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Anderson, Joseph.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjMkXDcC6gDvB8rjmMk7HC</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2014050963</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Nampalli, Jaya.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjFkF6M9DhGgdvhR7jq3V3</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2014050984</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Mobile Security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGw9PRfy9CB4gFQw3qKcRq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Speed, Timothy.</subfield><subfield code="t">Mobile Security : How to secure, privatize and recover your devices.</subfield><subfield code="d">Birmingham : Packt Publishing, ©2013</subfield><subfield code="z">9781849693608</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=639456</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=639456</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Kortext</subfield><subfield code="b">KTXT</subfield><subfield code="n">121291</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH26851111</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1336386</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">639456</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11136484</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn858229362 |
illustrated | Not Illustrated |
indexdate | 2025-04-11T08:41:34Z |
institution | BVB |
isbn | 9781849693615 1849693617 |
language | English |
oclc_num | 858229362 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (242 pages) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Speed, Tim. https://id.oclc.org/worldcat/entity/E39PCjKTgPmCm4McBq9vjX9Fcd http://id.loc.gov/authorities/names/nb2001018757 Mobile Security : How to secure, privatize and recover your devices / Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli. Birmingham : Packt Publishing, 2013. 1 online resource (242 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file rda Print version record. Living in a mobile world -- Users and mobile device management -- Privacy : small word, big consequences -- Mobile and social : the threats you should know about -- Protecting your mobile devices -- Support and warranty insurance -- Baby boomers, teens, and tweens -- Getting your life back after you've been hacked -- Appendix A. IBM notes traveler -- Appendix B. Mobile device management -- Appendix C. Tips to help you protect your mobile device -- Appendix D. Mobile Acceptable Use Policy template -- Appendix E. The history of social networking, the Internet, and smartphones. Encryption on iOS. Includes index. Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online. Cell phones Security measures. Pocket computers Security measures. Wireless communication systems Security measures. Ordinateurs de poche Sécurité Mesures. Transmission sans fil Sécurité Mesures. Téléphones cellulaires Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Wireless communication systems Security measures fast Nykamp, Darla. https://id.oclc.org/worldcat/entity/E39PCjxXpj9dBMy4Bp4BvctvVC http://id.loc.gov/authorities/names/no2014050966 Heiser, Mari. https://id.oclc.org/worldcat/entity/E39PCjJQ66hkPHFbQckcckgQxC http://id.loc.gov/authorities/names/no2014050979 Anderson, Joseph. https://id.oclc.org/worldcat/entity/E39PCjMkXDcC6gDvB8rjmMk7HC http://id.loc.gov/authorities/names/no2014050963 Nampalli, Jaya. https://id.oclc.org/worldcat/entity/E39PCjFkF6M9DhGgdvhR7jq3V3 http://id.loc.gov/authorities/names/no2014050984 has work: Mobile Security (Text) https://id.oclc.org/worldcat/entity/E39PCGw9PRfy9CB4gFQw3qKcRq https://id.oclc.org/worldcat/ontology/hasWork Print version: Speed, Timothy. Mobile Security : How to secure, privatize and recover your devices. Birmingham : Packt Publishing, ©2013 9781849693608 |
spellingShingle | Speed, Tim Mobile Security : How to secure, privatize and recover your devices / Living in a mobile world -- Users and mobile device management -- Privacy : small word, big consequences -- Mobile and social : the threats you should know about -- Protecting your mobile devices -- Support and warranty insurance -- Baby boomers, teens, and tweens -- Getting your life back after you've been hacked -- IBM notes traveler -- Mobile device management -- Tips to help you protect your mobile device -- Mobile Acceptable Use Policy template -- The history of social networking, the Internet, and smartphones. Cell phones Security measures. Pocket computers Security measures. Wireless communication systems Security measures. Ordinateurs de poche Sécurité Mesures. Transmission sans fil Sécurité Mesures. Téléphones cellulaires Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Wireless communication systems Security measures fast |
title | Mobile Security : How to secure, privatize and recover your devices / |
title_alt | Living in a mobile world -- Users and mobile device management -- Privacy : small word, big consequences -- Mobile and social : the threats you should know about -- Protecting your mobile devices -- Support and warranty insurance -- Baby boomers, teens, and tweens -- Getting your life back after you've been hacked -- IBM notes traveler -- Mobile device management -- Tips to help you protect your mobile device -- Mobile Acceptable Use Policy template -- The history of social networking, the Internet, and smartphones. |
title_auth | Mobile Security : How to secure, privatize and recover your devices / |
title_exact_search | Mobile Security : How to secure, privatize and recover your devices / |
title_full | Mobile Security : How to secure, privatize and recover your devices / Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli. |
title_fullStr | Mobile Security : How to secure, privatize and recover your devices / Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli. |
title_full_unstemmed | Mobile Security : How to secure, privatize and recover your devices / Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli. |
title_short | Mobile Security : |
title_sort | mobile security how to secure privatize and recover your devices |
title_sub | How to secure, privatize and recover your devices / |
topic | Cell phones Security measures. Pocket computers Security measures. Wireless communication systems Security measures. Ordinateurs de poche Sécurité Mesures. Transmission sans fil Sécurité Mesures. Téléphones cellulaires Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Wireless communication systems Security measures fast |
topic_facet | Cell phones Security measures. Pocket computers Security measures. Wireless communication systems Security measures. Ordinateurs de poche Sécurité Mesures. Transmission sans fil Sécurité Mesures. Téléphones cellulaires Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Wireless communication systems Security measures |
work_keys_str_mv | AT speedtim mobilesecurityhowtosecureprivatizeandrecoveryourdevices AT nykampdarla mobilesecurityhowtosecureprivatizeandrecoveryourdevices AT heisermari mobilesecurityhowtosecureprivatizeandrecoveryourdevices AT andersonjoseph mobilesecurityhowtosecureprivatizeandrecoveryourdevices AT nampallijaya mobilesecurityhowtosecureprivatizeandrecoveryourdevices |