|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn793291729 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
120508s2009 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d OCLCQ
|d DEBSZ
|d OCLCA
|d OCLCO
|d N$T
|d YDXCP
|d IDEBK
|d AU@
|d DEBBG
|d UBY
|d TEFOD
|d OCLCO
|d TEFOD
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCA
|d OCLCF
|d CEF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 316223880
|a 630923264
|
020 |
|
|
|a 1597492981
|
020 |
|
|
|a 9781597492980
|
020 |
|
|
|a 9780080949192
|q (electronic bk.)
|
020 |
|
|
|a 0080949193
|q (electronic bk.)
|
020 |
|
|
|z 9781597492980
|
029 |
1 |
|
|a AU@
|b 000045592887
|
029 |
1 |
|
|a DEBBG
|b BV039828799
|
029 |
1 |
|
|a DEBBG
|b BV040902068
|
029 |
1 |
|
|a DEBSZ
|b 378295179
|
029 |
1 |
|
|a DEBSZ
|b 381381323
|
035 |
|
|
|a (OCoLC)793291729
|z (OCoLC)316223880
|z (OCoLC)630923264
|
037 |
|
|
|a CL0500000137
|b Safari Books Online
|
037 |
|
|
|a 4D9C4755-B31C-4066-83BC-D1D506527F73
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5102.85
|b .M62 2009
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Mobile malware attacks and defense /
|c Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others].
|
260 |
|
|
|a Burlington, MA :
|b Syngress Pub.,
|c ©2009.
|
300 |
|
|
|a 1 online resource (xxv, 409 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures.
|
520 |
|
|
|a Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Cell phone systems
|x Security measures.
|
650 |
|
0 |
|a Mobile communication systems
|x Security measures.
|
650 |
|
0 |
|a Mobile computing
|x Security measures.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Computer crimes
|v Case studies.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Wireless Internet
|x Security measures.
|
650 |
|
6 |
|a Téléphonie cellulaire
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Radiocommunications mobiles
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Informatique mobile
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Criminalité informatique
|v Études de cas.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
6 |
|a Internet mobile
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|2 fast
|
650 |
|
7 |
|a Computer crimes
|x Prevention
|2 fast
|
650 |
|
7 |
|a Hackers
|2 fast
|
655 |
|
7 |
|a Case studies
|2 fast
|
700 |
1 |
|
|a Dunham, Ken.
|
700 |
1 |
|
|a Abu-Nimeh, Saeed.
|
776 |
0 |
8 |
|i Print version:
|t Mobile malware attacks and defense.
|d Burlington, MA : Elsevier, ©2009
|z 9781597492980
|w (DLC) 2008042884
|w (OCoLC)229025908
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781597492980/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 249331
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2935214
|
994 |
|
|
|a 92
|b IZTAP
|