Weiter zum Inhalt
UB der TUM
OPAC
Universitätsbibliothek
Technische Universität München
  • Temporäre Merkliste: 0 temporär gemerkt (Voll)
  • Hilfe
    • Kontakt
    • Suchtipps
    • Informationen Fernleihe
  • Chat
  • Tools
    • Suchhistorie
    • Freie Fernleihe
    • Erwerbungsvorschlag
  • English
  • Konto

    Konto

    • Ausgeliehen
    • Bestellt
    • Sperren/Gebühren
    • Profil
    • Suchhistorie
  • Log out
  • Login
  • Bücher & Journals
  • Papers
Erweitert
  • Mobile Security
  • Zitieren
  • Als E-Mail versenden
  • Drucken
  • Datensatz exportieren
    • Exportieren nach RefWorks
    • Exportieren nach EndNoteWeb
    • Exportieren nach EndNote
    • Exportieren nach BibTeX
    • Exportieren nach RIS
  • Zur Merkliste hinzufügen
  • Temporär merken Aus der temporären Merkliste entfernen
  • Permalink
Export abgeschlossen — 
Buchumschlag
Gespeichert in:
Bibliographische Detailangaben
Beteilige Person: Furnell, Steven (VerfasserIn)
Format: Elektronisch E-Book
Sprache:Englisch
Veröffentlicht: Ely IT Governance Pub. 2009
Schlagwörter:
Mobile computing / Security measures
Wireless communication systems
COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Mobile computing > Security measures
Links:http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148
Beschreibung:Print version record
Umfang:1 online resource (77 pages)
ISBN:1849280207
1849280215
9781849280204
9781849280211
Internformat

MARC

LEADER 00000nam a2200000zc 4500
001 BV043031490
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 151120s2009 xx o|||| 00||| eng d
020 |a 1849280207  |9 1-84928-020-7 
020 |a 1849280215  |9 1-84928-021-5 
020 |a 9781849280204  |9 978-1-84928-020-4 
020 |a 9781849280211  |9 978-1-84928-021-1 
035 |a (OCoLC)609854809 
035 |a (DE-599)BVBBV043031490 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-1046  |a DE-1047 
082 0 |a 005.8 
100 1 |a Furnell, Steven  |e Verfasser  |4 aut 
245 1 0 |a Mobile Security  |b a Pocket Guide 
264 1 |a Ely  |b IT Governance Pub.  |c 2009 
300 |a 1 online resource (77 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Print version record 
505 8 |a Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources 
505 8 |a The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems 
650 4 |a Mobile computing / Security measures 
650 4 |a Wireless communication systems 
650 7 |a COMPUTERS / Internet / Security  |2 bisacsh 
650 7 |a COMPUTERS / Networking / Security  |2 bisacsh 
650 7 |a COMPUTERS / Security / General  |2 bisacsh 
650 4 |a Mobile computing  |x Security measures 
650 4 |a Wireless communication systems 
856 4 0 |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148  |x Aggregator  |3 Volltext 
912 |a ZDB-4-EBA 
943 1 |a oai:aleph.bib-bvb.de:BVB01-028456141 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148  |l DE-1046  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148  |l DE-1047  |p ZDB-4-EBA  |q FAW_PDA_EBA  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1818981108995325952
any_adam_object
author Furnell, Steven
author_facet Furnell, Steven
author_role aut
author_sort Furnell, Steven
author_variant s f sf
building Verbundindex
bvnumber BV043031490
collection ZDB-4-EBA
contents Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources
The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems
ctrlnum (OCoLC)609854809
(DE-599)BVBBV043031490
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02340nam a2200469zc 4500</leader><controlfield tag="001">BV043031490</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151120s2009 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280207</subfield><subfield code="9">1-84928-020-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280215</subfield><subfield code="9">1-84928-021-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280204</subfield><subfield code="9">978-1-84928-020-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280211</subfield><subfield code="9">978-1-84928-021-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)609854809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043031490</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile Security</subfield><subfield code="b">a Pocket Guide</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (77 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=391148</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028456141</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=391148</subfield><subfield code="l">DE-1046</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=391148</subfield><subfield code="l">DE-1047</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV043031490
illustrated Not Illustrated
indexdate 2024-12-20T17:26:05Z
institution BVB
isbn 1849280207
1849280215
9781849280204
9781849280211
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-028456141
oclc_num 609854809
open_access_boolean
owner DE-1046
DE-1047
owner_facet DE-1046
DE-1047
physical 1 online resource (77 pages)
psigel ZDB-4-EBA
ZDB-4-EBA FAW_PDA_EBA
publishDate 2009
publishDateSearch 2009
publishDateSort 2009
publisher IT Governance Pub.
record_format marc
spelling Furnell, Steven Verfasser aut
Mobile Security a Pocket Guide
Ely IT Governance Pub. 2009
1 online resource (77 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Print version record
Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources
The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems
Mobile computing / Security measures
Wireless communication systems
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Mobile computing Security measures
http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148 Aggregator Volltext
spellingShingle Furnell, Steven
Mobile Security a Pocket Guide
Chapter 1: getting mobile; chapter 2: surviving outside; chapter 3: getting connected; chapter 4: ensuring it's you; chapter 5: safeguarding your data; chapter 6: are you a moving target?; chapter 7: know your limits; conclusions; itg resources
The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems
Mobile computing / Security measures
Wireless communication systems
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Mobile computing Security measures
title Mobile Security a Pocket Guide
title_auth Mobile Security a Pocket Guide
title_exact_search Mobile Security a Pocket Guide
title_full Mobile Security a Pocket Guide
title_fullStr Mobile Security a Pocket Guide
title_full_unstemmed Mobile Security a Pocket Guide
title_short Mobile Security
title_sort mobile security a pocket guide
title_sub a Pocket Guide
topic Mobile computing / Security measures
Wireless communication systems
COMPUTERS / Internet / Security bisacsh
COMPUTERS / Networking / Security bisacsh
COMPUTERS / Security / General bisacsh
Mobile computing Security measures
topic_facet Mobile computing / Security measures
Wireless communication systems
COMPUTERS / Internet / Security
COMPUTERS / Networking / Security
COMPUTERS / Security / General
Mobile computing Security measures
url http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=391148
work_keys_str_mv AT furnellsteven mobilesecurityapocketguide
  • Verfügbarkeit

‌

Per Fernleihe bestellen
  • Impressum
  • Datenschutz
  • Barrierefreiheit
  • Kontakt