Mobile Security : How to secure, privatize and recover your devices /

Saved in:
Bibliographic Details
Author / Creator:Speed, Tim.
Imprint:Birmingham : Packt Publishing, 2013.
Description:1 online resource (242 pages)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11204769
Hidden Bibliographic Details
Other authors / contributors:Nykamp, Darla.
Heiser, Mari.
Anderson, Joseph.
Nampalli, Jaya.
ISBN:9781849693615
1849693617
Digital file characteristics:text file
Notes:Encryption on iOS.
Includes index.
Print version record.
Summary:Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.
Other form:Print version: Speed, Timothy. Mobile Security : How to secure, privatize and recover your devices. Birmingham : Packt Publishing, ©2013 9781849693608

MARC

LEADER 00000cam a2200000Ia 4500
001 11204769
006 m o d
007 cr cnu---unuuu
008 130914s2013 enk o 001 0 eng d
005 20240711203215.2
019 |a 968048685  |a 969028056  |a 994452628 
020 |a 9781849693615  |q (electronic bk.) 
020 |a 1849693617  |q (electronic bk.) 
035 |a (OCoLC)858229362  |z (OCoLC)968048685  |z (OCoLC)969028056  |z (OCoLC)994452628 
035 9 |a (OCLCCM-CC)858229362 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d YDXCP  |d N$T  |d IUL  |d OCLCO  |d OCLCQ  |d DEBSZ  |d OCLCO  |d OCLCQ  |d OCLCO  |d FEM  |d JBG  |d AGLDB  |d ICA  |d ZCU  |d MERUC  |d OCLCQ  |d D6H  |d OCLCF  |d VTS  |d ICG  |d OCLCQ  |d STF  |d DKC  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d K6U 
049 |a MAIN 
050 4 |a TK5103.2 .S384 2013 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
100 1 |a Speed, Tim.  |0 http://id.loc.gov/authorities/names/nb2001018757 
245 1 0 |a Mobile Security :  |b How to secure, privatize and recover your devices /  |c Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli. 
260 |a Birmingham :  |b Packt Publishing,  |c 2013. 
300 |a 1 online resource (242 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
588 0 |a Print version record. 
505 0 0 |t Living in a mobile world --  |t Users and mobile device management --  |t Privacy : small word, big consequences --  |t Mobile and social : the threats you should know about --  |t Protecting your mobile devices --  |t Support and warranty insurance --  |t Baby boomers, teens, and tweens --  |t Getting your life back after you've been hacked --  |g Appendix A.  |t IBM notes traveler --  |g Appendix B.  |t Mobile device management --  |g Appendix C.  |t Tips to help you protect your mobile device --  |g Appendix D.  |t Mobile Acceptable Use Policy template --  |g Appendix E.  |t The history of social networking, the Internet, and smartphones. 
500 |a Encryption on iOS. 
500 |a Includes index. 
520 |a Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online. 
650 0 |a Cell phones  |x Security measures. 
650 0 |a Pocket computers  |x Security measures. 
650 0 |a Wireless communication systems  |x Security measures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Wireless communication systems  |x Security measures.  |2 fast  |0 (OCoLC)fst01176222 
655 0 |a Electronic books. 
655 4 |a Electronic books. 
700 1 |a Nykamp, Darla.  |0 http://id.loc.gov/authorities/names/no2014050966 
700 1 |a Heiser, Mari.  |0 http://id.loc.gov/authorities/names/no2014050979 
700 1 |a Anderson, Joseph.  |0 http://id.loc.gov/authorities/names/no2014050963 
700 1 |a Nampalli, Jaya.  |0 http://id.loc.gov/authorities/names/no2014050984 
776 0 8 |i Print version:  |a Speed, Timothy.  |t Mobile Security : How to secure, privatize and recover your devices.  |d Birmingham : Packt Publishing, ©2013  |z 9781849693608 
903 |a HeVa 
929 |a oclccm 
999 f f |i caca1dbc-b191-5613-b14b-e46d5b183ad0  |s fc6c1c61-48f5-5960-a0ab-5350cb5edda7 
928 |t Library of Congress classification  |a TK5103.2 .S384 2013  |l Online  |c UC-FullText  |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=639456  |z eBooks on EBSCOhost  |g ebooks  |i 12395605