Mobile Security: a Pocket Guide
Saved in:
Main Author: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Ely
IT Governance Pub.
2009
|
Subjects: | |
Item Description: | Print version record |
Physical Description: | 1 online resource (77 pages) |
ISBN: | 9781849280211 1849280215 |
Staff View
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV045348839 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2009 xx o|||| 00||| eng d | ||
020 | |a 9781849280211 |9 978-1-84928-021-1 | ||
020 | |a 1849280215 |9 1-84928-021-5 | ||
035 | |a (ZDB-4-ITC)ocn609854809 | ||
035 | |a (OCoLC)609854809 | ||
035 | |a (DE-599)BVBBV045348839 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Furnell, Steven |e Verfasser |4 aut | |
245 | 1 | 0 | |a Mobile Security |b a Pocket Guide |
264 | 1 | |a Ely |b IT Governance Pub. |c 2009 | |
300 | |a 1 online resource (77 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Wireless communication systems |2 fast | |
650 | 4 | |a Mobile computing |x Security measures |a Wireless communication systems | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781849280204 |
912 | |a ZDB-4-ITC | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030735493 |
Record in the Search Index
_version_ | 1818984799924125696 |
---|---|
any_adam_object | |
author | Furnell, Steven |
author_facet | Furnell, Steven |
author_role | aut |
author_sort | Furnell, Steven |
author_variant | s f sf |
building | Verbundindex |
bvnumber | BV045348839 |
collection | ZDB-4-ITC |
contents | The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems |
ctrlnum | (ZDB-4-ITC)ocn609854809 (OCoLC)609854809 (DE-599)BVBBV045348839 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01548nam a2200385zc 4500</leader><controlfield tag="001">BV045348839</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2009 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849280211</subfield><subfield code="9">978-1-84928-021-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849280215</subfield><subfield code="9">1-84928-021-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn609854809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)609854809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348839</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Furnell, Steven</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mobile Security</subfield><subfield code="b">a Pocket Guide</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (77 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield><subfield code="a">Wireless communication systems</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781849280204</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735493</subfield></datafield></record></collection> |
id | DE-604.BV045348839 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:24:45Z |
institution | BVB |
isbn | 9781849280211 1849280215 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735493 |
oclc_num | 609854809 |
open_access_boolean | |
physical | 1 online resource (77 pages) |
psigel | ZDB-4-ITC |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Furnell, Steven Verfasser aut Mobile Security a Pocket Guide Ely IT Governance Pub. 2009 1 online resource (77 pages) txt rdacontent c rdamedia cr rdacarrier Print version record The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems fast Mobile computing Security measures Wireless communication systems Erscheint auch als Druck-Ausgabe 9781849280204 |
spellingShingle | Furnell, Steven Mobile Security a Pocket Guide The book provides a concise reference to the key security issues affecting those that deploy and use mobile technologies to support their organisations. It aims to raise awareness of the threats to which mobile devices, users and data are exposed, as well as to provide advice on how to address the problems COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems fast Mobile computing Security measures Wireless communication systems |
title | Mobile Security a Pocket Guide |
title_auth | Mobile Security a Pocket Guide |
title_exact_search | Mobile Security a Pocket Guide |
title_full | Mobile Security a Pocket Guide |
title_fullStr | Mobile Security a Pocket Guide |
title_full_unstemmed | Mobile Security a Pocket Guide |
title_short | Mobile Security |
title_sort | mobile security a pocket guide |
title_sub | a Pocket Guide |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Wireless communication systems fast Mobile computing Security measures Wireless communication systems |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Wireless communication systems Mobile computing Security measures Wireless communication systems |
work_keys_str_mv | AT furnellsteven mobilesecurityapocketguide |