|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
SCIDIR_ocn318353699 |
003 |
OCoLC |
005 |
20231117015302.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
090413s2009 maua ob 001 0 eng d |
040 |
|
|
|a OPELS
|b eng
|e pn
|c OPELS
|d OPELS
|d OCLCA
|d SHH
|d OCLCQ
|d YDXCP
|d OCLCA
|d OCLCO
|d MERUC
|d EBLCP
|d IDEBK
|d DEBSZ
|d E7B
|d SNK
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d COO
|d OCLCO
|d OTZ
|d OCLCQ
|d OCLCA
|d NLE
|d OCLCQ
|d UUM
|d OCLCF
|d D6H
|d OCLCQ
|d UKMGB
|d WYU
|d UAB
|d LEAUB
|d STF
|d OL$
|d VT2
|d UHL
|d OCLCQ
|d VLY
|d S2H
|d OCLCO
|d LVT
|d OCLCQ
|d OCLCO
|d OCLCQ
|
015 |
|
|
|a GBA8B9928
|2 bnb
|
015 |
|
|
|a GBB6H2444
|2 bnb
|
016 |
7 |
|
|a 017549450
|2 Uk
|
016 |
7 |
|
|z 014778512
|2 Uk
|
019 |
|
|
|a 437246555
|a 476224462
|a 646787914
|a 666957597
|a 712981372
|a 815751420
|a 815782001
|a 823121048
|a 823842426
|a 823910230
|a 824098737
|a 824153919
|a 994925266
|a 1062895626
|a 1064763625
|a 1103261932
|a 1112914091
|a 1162092996
|a 1229184931
|
020 |
|
|
|a 9780080949192
|q (electronic bk.)
|
020 |
|
|
|a 0080949193
|q (electronic bk.)
|
020 |
|
|
|a 1282169335
|
020 |
|
|
|a 9781282169333
|
020 |
|
|
|a 1281928879
|
020 |
|
|
|a 9781281928870
|
020 |
|
|
|a 9786611928872
|
020 |
|
|
|a 6611928871
|
020 |
|
|
|a 9786612169335
|
020 |
|
|
|a 6612169338
|
020 |
|
|
|z 9781597492980
|
020 |
|
|
|z 1597492981
|
035 |
|
|
|a (OCoLC)318353699
|z (OCoLC)437246555
|z (OCoLC)476224462
|z (OCoLC)646787914
|z (OCoLC)666957597
|z (OCoLC)712981372
|z (OCoLC)815751420
|z (OCoLC)815782001
|z (OCoLC)823121048
|z (OCoLC)823842426
|z (OCoLC)823910230
|z (OCoLC)824098737
|z (OCoLC)824153919
|z (OCoLC)994925266
|z (OCoLC)1062895626
|z (OCoLC)1064763625
|z (OCoLC)1103261932
|z (OCoLC)1112914091
|z (OCoLC)1162092996
|z (OCoLC)1229184931
|
050 |
|
4 |
|a TK5102.85
|b .M62 2009
|
072 |
|
7 |
|a K
|2 bicssc
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
245 |
0 |
0 |
|a Mobile malware attacks and defense /
|c Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others].
|
260 |
|
|
|a Burlington, MA :
|b Syngress/Elsevier,
|c �2009.
|
300 |
|
|
|a 1 online resource (xxv, 409 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
520 |
|
|
|a Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures.
|
546 |
|
|
|a English.
|
650 |
|
0 |
|a Cell phone systems
|x Security measures.
|
650 |
|
0 |
|a Mobile communication systems
|x Security measures.
|
650 |
|
0 |
|a Mobile computing
|x Security measures.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
0 |
|a Computer crimes
|v Case studies.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Wireless Internet
|x Security measures.
|
650 |
|
6 |
|a T�el�ephonie cellulaire
|0 (CaQQLa)201-0317146
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
6 |
|a Radiocommunications mobiles
|0 (CaQQLa)201-0023226
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
6 |
|a Informatique mobile
|0 (CaQQLa)201-0274402
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
6 |
|a Criminalit�e informatique
|0 (CaQQLa)201-0056438
|v �Etudes de cas.
|0 (CaQQLa)201-0376950
|
650 |
|
6 |
|a Pirates informatiques.
|0 (CaQQLa)201-0279206
|
650 |
|
6 |
|a Internet mobile
|0 (CaQQLa)201-0364307
|x S�ecurit�e
|0 (CaQQLa)201-0373949
|x Mesures.
|0 (CaQQLa)201-0373949
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes.
|2 fast
|0 (OCoLC)fst00872063
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
655 |
|
7 |
|a Case studies.
|2 fast
|0 (OCoLC)fst01423765
|
655 |
|
7 |
|a Case studies.
|2 lcgft
|
655 |
|
7 |
|a �Etudes de cas.
|2 rvmgf
|0 (CaQQLa)RVMGF-000001726
|
700 |
1 |
|
|a Dunham, Ken.
|
776 |
0 |
8 |
|i Print version:
|t Mobile malware attacks and defense.
|d Burlington, MA : Syngress/Elsevier, �2009
|z 9781597492980
|z 1597492981
|w (DLC) 2008042884
|w (OCoLC)229025908
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597492980
|z Texto completo
|