Mobile malware attacks and defense

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Burlington, MA Syngress/Elsevier © 2009
Schlagworte:
Online-Zugang:DE-860
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV046125077
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 190827s2009 xx a||| o|||| 00||| eng d
015 |a GBB6H2444  |2 dnb 
015 |a GBA8B9928  |2 dnb 
020 |a 9780080949192  |9 978-0-08-094919-2 
020 |a 0080949193  |9 0-08-094919-3 
020 |a 1282169335  |9 1-282-16933-5 
020 |a 9781282169333  |9 978-1-282-16933-3 
035 |a (ZDB-33-ESD)ocn318353699 
035 |a (OCoLC)318353699 
035 |a (DE-599)BVBBV046125077 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 005.8  |2 22 
245 1 0 |a Mobile malware attacks and defense  |c Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others] 
264 1 |a Burlington, MA  |b Syngress/Elsevier  |c © 2009 
300 |a 1 online resource (xxv, 409 pages)  |b illustrations 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index 
520 |a Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 7 |a Computer crimes  |2 fast 
650 7 |a Computer crimes / Prevention  |2 fast 
650 7 |a Hackers  |2 fast 
650 4 |a Cell phone systems  |x Security measures 
650 4 |a Mobile communication systems  |x Security measures 
650 4 |a Mobile computing  |x Security measures 
650 4 |a Computer crimes  |x Prevention 
650 4 |a Computer crimes  |v Case studies 
650 4 |a Hackers 
650 4 |a Wireless Internet  |x Security measures 
655 7 |0 (DE-588)4522595-3  |a Fallstudiensammlung  |2 gnd-content 
700 1 |a Dunham, Ken  |e Sonstige  |4 oth 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 1597492981 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781597492980 
856 4 0 |u http://www.sciencedirect.com/science/book/9781597492980  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-33-ESD 
943 1 |a oai:aleph.bib-bvb.de:BVB01-031505531 
966 e |u http://www.sciencedirect.com/science/book/9781597492980  |l DE-860  |p ZDB-33-ESD  |q FLA_PDA_ESD  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1819307080901722112
any_adam_object
building Verbundindex
bvnumber BV046125077
collection ZDB-33-ESD
ctrlnum (ZDB-33-ESD)ocn318353699
(OCoLC)318353699
(DE-599)BVBBV046125077
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02629nam a2200577zc 4500</leader><controlfield tag="001">BV046125077</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2009 xx a||| o|||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6H2444</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA8B9928</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080949192</subfield><subfield code="9">978-0-08-094919-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080949193</subfield><subfield code="9">0-08-094919-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282169335</subfield><subfield code="9">1-282-16933-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282169333</subfield><subfield code="9">978-1-282-16933-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn318353699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)318353699</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125077</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile malware attacks and defense</subfield><subfield code="c">Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">© 2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxv, 409 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer crimes / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cell phone systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="v">Case studies</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless Internet</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4522595-3</subfield><subfield code="a">Fallstudiensammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dunham, Ken</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597492981</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597492980</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597492980</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505531</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597492980</subfield><subfield code="l">DE-860</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)4522595-3 Fallstudiensammlung gnd-content
genre_facet Fallstudiensammlung
id DE-604.BV046125077
illustrated Illustrated
indexdate 2024-12-24T07:47:16Z
institution BVB
isbn 9780080949192
0080949193
1282169335
9781282169333
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031505531
oclc_num 318353699
open_access_boolean
physical 1 online resource (xxv, 409 pages) illustrations
psigel ZDB-33-ESD
ZDB-33-ESD FLA_PDA_ESD
publishDate 2009
publishDateSearch 2009
publishDateSort 2009
publisher Syngress/Elsevier
record_format marc
spelling Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others]
Burlington, MA Syngress/Elsevier © 2009
1 online resource (xxv, 409 pages) illustrations
txt rdacontent
c rdamedia
cr rdacarrier
Includes bibliographical references and index
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer crimes fast
Computer crimes / Prevention fast
Hackers fast
Cell phone systems Security measures
Mobile communication systems Security measures
Mobile computing Security measures
Computer crimes Prevention
Computer crimes Case studies
Hackers
Wireless Internet Security measures
(DE-588)4522595-3 Fallstudiensammlung gnd-content
Dunham, Ken Sonstige oth
Erscheint auch als Druck-Ausgabe 1597492981
Erscheint auch als Druck-Ausgabe 9781597492980
http://www.sciencedirect.com/science/book/9781597492980 Verlag URL des Erstveröffentlichers Volltext
spellingShingle Mobile malware attacks and defense
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer crimes fast
Computer crimes / Prevention fast
Hackers fast
Cell phone systems Security measures
Mobile communication systems Security measures
Mobile computing Security measures
Computer crimes Prevention
Computer crimes Case studies
Hackers
Wireless Internet Security measures
subject_GND (DE-588)4522595-3
title Mobile malware attacks and defense
title_auth Mobile malware attacks and defense
title_exact_search Mobile malware attacks and defense
title_full Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others]
title_fullStr Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others]
title_full_unstemmed Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh [and others]
title_short Mobile malware attacks and defense
title_sort mobile malware attacks and defense
topic COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Computer crimes fast
Computer crimes / Prevention fast
Hackers fast
Cell phone systems Security measures
Mobile communication systems Security measures
Mobile computing Security measures
Computer crimes Prevention
Computer crimes Case studies
Hackers
Wireless Internet Security measures
topic_facet COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Computer crimes
Computer crimes / Prevention
Hackers
Cell phone systems Security measures
Mobile communication systems Security measures
Mobile computing Security measures
Computer crimes Prevention
Computer crimes Case studies
Wireless Internet Security measures
Fallstudiensammlung
url http://www.sciencedirect.com/science/book/9781597492980
work_keys_str_mv AT dunhamken mobilemalwareattacksanddefense