Cargando…

End to End Mobile Security /

The more that we become connected the more we need to be conscious of mobile security. Contacts, emails, passwords, location data, confidential documents, photos, etc. are all contained on our phones and thus are a prime target for malicious hackers and leaked data. It is critical to understand how...

Descripción completa

Detalles Bibliográficos
Autor principal: Minakata, Jeff (Autor, VerfasserIn.)
Autor Corporativo: Safari, an O'Reilly Media Company (Contribuidor, MitwirkendeR.)
Formato: Video
Idioma:Inglés
Publicado: [Erscheinungsort nicht ermittelbar] : EC-Council, 2020
Edición:1st edition.
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1268119563
003 OCoLC
005 20231017213018.0
006 m o c
007 cr uuu---uuuuu
007 vz czazuu
008 210914s2020 mau--- o vleng d
040 |a GBVCP  |b ger  |e rda  |c GBVCP  |d OCLCQ 
035 |a (OCoLC)1268119563 
049 |a UAMI 
100 1 |a Minakata, Jeff,  |e VerfasserIn.  |4 aut 
245 1 0 |a End to End Mobile Security /  |c Minakata, Jeff. 
250 |a 1st edition. 
264 1 |a [Erscheinungsort nicht ermittelbar] :  |b EC-Council,  |c 2020 
264 2 |a Boston, MA :  |b Safari 
300 |a 1 online resource (1 video file, circa 3 hr., 8 min.) 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent/ger 
337 |a Computermedien  |b c  |2 rdamedia/ger 
338 |a Online-Ressource  |b cr  |2 rdacarrier/ger 
500 |a Online resource; Title from title screen (viewed December 30, 2020). 
520 |a The more that we become connected the more we need to be conscious of mobile security. Contacts, emails, passwords, location data, confidential documents, photos, etc. are all contained on our phones and thus are a prime target for malicious hackers and leaked data. It is critical to understand how to secure our mobile devices and learn best practices. In this course, we will be taking a look at both iOS (Apple) and Android devices in order to learn best practices with our devices. How people can track us by the photos that we take, steps that we can take in securing our phone numbers, using secure communication to keep our conversations private, how to find our device(s) and lock them if they are lost or stolen, and much more. By the end of this course, you will build a better understanding of the attack and defence side in terms of mobile security. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
710 2 |a Safari, an O'Reilly Media Company.,  |e MitwirkendeR.  |4 ctb 
856 4 0 |u https://learning.oreilly.com/videos/~/550820BCRV/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP