|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
JSTOR_ocn609854809 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr n||---||||| |
008 |
100427s2009 xx ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d STF
|d IDEBK
|d OCLCQ
|d CDX
|d N$T
|d B24X7
|d OCLCQ
|d UMI
|d DEBSZ
|d JSTOR
|d NLGGC
|d OCLCQ
|d YDXCP
|d COO
|d OCLCQ
|d AGLDB
|d ZCU
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d IOG
|d EZ9
|d OCLCF
|d JBG
|d VTS
|d CEF
|d ICG
|d OCLCQ
|d WYU
|d LVT
|d UAB
|d DKC
|d AU@
|d OCLCQ
|d M8D
|d UKAHL
|d OCLCQ
|d MM9
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 489103919
|a 765143523
|a 857301847
|
020 |
|
|
|a 9781849280211
|q (electronic bk.)
|
020 |
|
|
|a 1849280215
|q (electronic bk.)
|
020 |
|
|
|z 9781849280204
|
020 |
|
|
|z 1849280207
|
029 |
1 |
|
|a AU@
|b 000051395664
|
029 |
1 |
|
|a AU@
|b 000052007307
|
029 |
1 |
|
|a AU@
|b 000060584843
|
029 |
1 |
|
|a AU@
|b 000065313305
|
029 |
1 |
|
|a CDX
|b 10730039
|
029 |
1 |
|
|a DEBBG
|b BV041431793
|
029 |
1 |
|
|a DEBBG
|b BV043031490
|
029 |
1 |
|
|a DEBBG
|b BV044141741
|
029 |
1 |
|
|a DEBSZ
|b 398276609
|
029 |
1 |
|
|a DEBSZ
|b 421529059
|
029 |
1 |
|
|a DEBSZ
|b 430809891
|
029 |
1 |
|
|a AU@
|b 000067111166
|
035 |
|
|
|a (OCoLC)609854809
|z (OCoLC)489103919
|z (OCoLC)765143523
|z (OCoLC)857301847
|
037 |
|
|
|a 227499
|b MIL
|
037 |
|
|
|a 22573/ctt4k56sm
|b JSTOR
|
050 |
|
4 |
|a QA76.59
|b .F87 2009eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Furnell, Steven.
|
245 |
1 |
0 |
|a Mobile Security :
|b a Pocket Guide.
|
260 |
|
|
|a Ely :
|b IT Governance Pub.,
|c 2009.
|
300 |
|
|
|a 1 online resource (77 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources.
|
520 |
|
|
|a The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems.
|
504 |
|
|
|a Includes bibliographical references.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
650 |
|
0 |
|a Mobile computing
|x Security measures.
|
650 |
|
0 |
|a Wireless communication systems.
|
650 |
|
6 |
|a Informatique mobile
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Transmission sans fil.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Wireless communication systems.
|2 fast
|0 (OCoLC)fst01176209
|
776 |
0 |
8 |
|i Print version:
|z 9781849280204
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh772
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26065995
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00034445
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 10730039
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL480396
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 391148
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 227499
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3235689
|
994 |
|
|
|a 92
|b IZTAP
|