Cargando…

Mobile Security : How to secure, privatize and recover your devices /

Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Speed, Tim
Otros Autores: Nykamp, Darla, Heiser, Mari, Anderson, Joseph, Nampalli, Jaya
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, 2013.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn858229362
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 130914s2013 enk o 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDXCP  |d N$T  |d IUL  |d OCLCO  |d OCLCQ  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d FEM  |d JBG  |d AGLDB  |d ICA  |d ZCU  |d MERUC  |d OCLCQ  |d D6H  |d OCLCF  |d VTS  |d ICG  |d OCLCQ  |d STF  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 968048685  |a 969028056  |a 994452628 
020 |a 9781849693615  |q (electronic bk.) 
020 |a 1849693617  |q (electronic bk.) 
029 1 |a AU@  |b 000058967525 
029 1 |a CHNEW  |b 001052010 
029 1 |a CHVBK  |b 567708306 
029 1 |a DEBBG  |b BV044062869 
029 1 |a DEBSZ  |b 431474125 
029 1 |a DEBSZ  |b 493126848 
035 |a (OCoLC)858229362  |z (OCoLC)968048685  |z (OCoLC)969028056  |z (OCoLC)994452628 
050 4 |a TK5103.2 .S384 2013 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Speed, Tim. 
245 1 0 |a Mobile Security :  |b How to secure, privatize and recover your devices /  |c Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli. 
260 |a Birmingham :  |b Packt Publishing,  |c 2013. 
300 |a 1 online resource (242 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
588 0 |a Print version record. 
505 0 0 |t Living in a mobile world --  |t Users and mobile device management --  |t Privacy : small word, big consequences --  |t Mobile and social : the threats you should know about --  |t Protecting your mobile devices --  |t Support and warranty insurance --  |t Baby boomers, teens, and tweens --  |t Getting your life back after you've been hacked --  |g Appendix A.  |t IBM notes traveler --  |g Appendix B.  |t Mobile device management --  |g Appendix C.  |t Tips to help you protect your mobile device --  |g Appendix D.  |t Mobile Acceptable Use Policy template --  |g Appendix E.  |t The history of social networking, the Internet, and smartphones. 
500 |a Encryption on iOS. 
500 |a Includes index. 
520 |a Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Cell phones  |x Security measures. 
650 0 |a Pocket computers  |x Security measures. 
650 0 |a Wireless communication systems  |x Security measures. 
650 6 |a Ordinateurs de poche  |x Sécurité  |x Mesures. 
650 6 |a Transmission sans fil  |x Sécurité  |x Mesures. 
650 6 |a Téléphones cellulaires  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
700 1 |a Nykamp, Darla. 
700 1 |a Heiser, Mari. 
700 1 |a Anderson, Joseph. 
700 1 |a Nampalli, Jaya. 
758 |i has work:  |a Mobile Security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGw9PRfy9CB4gFQw3qKcRq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Speed, Timothy.  |t Mobile Security : How to secure, privatize and recover your devices.  |d Birmingham : Packt Publishing, ©2013  |z 9781849693608 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1336386  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26851111 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1336386 
938 |a EBSCOhost  |b EBSC  |n 639456 
938 |a YBP Library Services  |b YANK  |n 11136484 
994 |a 92  |b IZTAP