Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Mobile malware attacks and defense
Record Type:
Electronic resources : Monograph/item
Title/Author:
Mobile malware attacks and defenseKen Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.].
other author:
Dunham, Ken.
Published:
Burlington, MA :Syngress/Elsevier,c2009.
Description:
1 online resource (xxv, 409 p.) :ill.
Subject:
Mobile communication systemsSecurity measures.
Online resource:
An electronic book accessible through the World Wide Web; click for information
Online resource:
http://site.ebrary.com/id/10269294
Online resource:
http://www.loc.gov/catdir/enhancements/fy0901/2008042884-d.html
Online resource:
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597492980
Mobile malware attacks and defense
Mobile malware attacks and defense
[electronic resource] /Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.]. - Burlington, MA :Syngress/Elsevier,c2009. - 1 online resource (xxv, 409 p.) :ill.
Includes bibliographical references and index.
Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures.
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
Source: 158477:158648Elsevier Science & Technologyhttp://www.sciencedirect.comSubjects--Topical Terms:
208192
Mobile communication systems
--Security measures.Index Terms--Genre/Form:
214472
Electronic books.
LC Class. No.: TK5102.85 / .M62 2009
Dewey Class. No.: 005.8
Mobile malware attacks and defense
LDR
:02406cmm 2200361Ia 4500
001
257063
003
OCoLC
005
20100729101520.0
006
m d
007
cr cn|||||||||
008
100818s2009 maua ob 001 0 eng d
020
$z
9781597492980
020
$z
1597492981
020
$a
9780080949192 (electronic bk.)
020
$a
0080949193 (electronic bk.)
035
$a
(OCoLC)318353699
035
$a
ocn318353699
037
$a
158477:158648
$b
Elsevier Science & Technology
$n
http://www.sciencedirect.com
040
$a
OPELS
$b
eng
$c
OPELS
$d
OPELS
$d
OCLCA
$d
SHH
049
$a
TEFA
050
1 4
$a
TK5102.85
$b
.M62 2009
082
0 4
$a
005.8
$2
22
245
0 0
$a
Mobile malware attacks and defense
$h
[electronic resource] /
$c
Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.].
260
$a
Burlington, MA :
$b
Syngress/Elsevier,
$c
c2009.
300
$a
1 online resource (xxv, 409 p.) :
$b
ill.
504
$a
Includes bibliographical references and index.
505
0
$a
Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures.
520
$a
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
650
0
$a
Mobile communication systems
$x
Security measures.
$3
208192
650
0
$a
Mobile computing
$x
Security measures.
$3
238169
650
0
$a
Computer crimes
$x
Prevention.
$3
317273
650
0
$a
Computer crimes
$v
Case studies.
$3
383227
650
0
$a
Computer hackers.
$3
213875
650
0
$a
Wireless Internet
$x
Security measures.
$3
238168
650
0
$a
Cell phone systems
$x
Security measures.
$3
383226
655
7
$a
Electronic books.
$2
local.
$3
214472
700
1
$a
Dunham, Ken.
$3
383224
776
1
$c
Original
$z
9781597492980
$z
1597492981
$w
(DLC) 2008042884
$w
(OCoLC)229025908
856
4 0
$3
ScienceDirect
$u
http://www.sciencedirect.com/science/book/9781597492980
$z
An electronic book accessible through the World Wide Web; click for information
856
4 0
$3
ebrary
$u
http://site.ebrary.com/id/10269294
856
4 2
$3
Publisher description
$u
http://www.loc.gov/catdir/enhancements/fy0901/2008042884-d.html
856
4 0
$3
Referex
$u
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597492980
$z
An electronic book accessible through the World Wide Web; click for information
994
$a
C0
$b
TEF
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000040142
電子館藏
1圖書
電子書
EB TK5102.85 D917 2009
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://www.sciencedirect.com/science/book/9781597492980
http://site.ebrary.com/id/10269294
http://www.loc.gov/catdir/enhancements/fy0901/2008042884-d.html
http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781597492980
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login