|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn857278187 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
130830s2013 enk o 000 0 eng d |
040 |
|
|
|a IDEBK
|b eng
|e pn
|c IDEBK
|d EBLCP
|d OCLCQ
|d MHW
|d MEAUC
|d YDXCP
|d DEBSZ
|d OCLCQ
|d S4S
|d N$T
|d OCLCQ
|d COO
|d OCLCQ
|d D6H
|d FEM
|d JBG
|d AGLDB
|d MERUC
|d OCLCQ
|d U3W
|d VTS
|d UKMGB
|d OCLCQ
|d STF
|d M8D
|d UKAHL
|d OCLCQ
|d AJS
|d OCLCQ
|d OCLCO
|d OCLCQ
|
016 |
7 |
|
|a 018014732
|2 Uk
|
019 |
|
|
|a 968105409
|a 968980376
|
020 |
|
|
|a 1299809448
|q (electronic bk.)
|
020 |
|
|
|a 9781299809444
|q (electronic bk.)
|
020 |
|
|
|a 9781849515610
|q (electronic bk.)
|
020 |
|
|
|a 1849515611
|q (electronic bk.)
|
020 |
|
|
|a 9781849515603
|
020 |
|
|
|a 1849515603
|
029 |
1 |
|
|a AU@
|b 000062476351
|
029 |
1 |
|
|a DEBBG
|b BV043777179
|
029 |
1 |
|
|a DEBSZ
|b 397616473
|
029 |
1 |
|
|a DEBSZ
|b 472797964
|
029 |
1 |
|
|a UKMGB
|b 018014732
|
029 |
1 |
|
|a UNITY
|b 139540830
|
035 |
|
|
|a (OCoLC)857278187
|z (OCoLC)968105409
|z (OCoLC)968980376
|
037 |
|
|
|a 512195
|b MIL
|
050 |
|
4 |
|a QA76.76.A65 .R384 2013
|
072 |
|
7 |
|a COM
|x 074000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rai, Pragati Ogal.
|
245 |
1 |
0 |
|a Android application security essentials /
|c Pragati Ogal Rai.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
520 |
|
|
|a Android Application Security Essentials is packed with examples, screenshots, illustrations, and real world use cases to secure your apps the right way. If you are looking for guidance and detailed instructions on how to secure app data, then this book is for you. Developers, architects, managers, and technologists who wish to enhance their knowledge of Android security will find this book interesting. Some prior knowledge of development on the Android stack is desirable but not required.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Smartphones
|x Security measures.
|
650 |
|
0 |
|a Application software
|x Security measures.
|
650 |
|
6 |
|a Téléphones intelligents
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Logiciels d'application
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Hardware
|x Mobile Devices.
|2 bisacsh
|
776 |
0 |
8 |
|i Print version:
|z 9781299809444
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=634911
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26850653
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1337689
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 634911
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26052627
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11086336
|
994 |
|
|
|a 92
|b IZTAP
|