|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
11204769 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130914s2013 enk o 001 0 eng d |
005 |
20240711203215.2 |
019 |
|
|
|a 968048685
|a 969028056
|a 994452628
|
020 |
|
|
|a 9781849693615
|q (electronic bk.)
|
020 |
|
|
|a 1849693617
|q (electronic bk.)
|
035 |
|
|
|a (OCoLC)858229362
|z (OCoLC)968048685
|z (OCoLC)969028056
|z (OCoLC)994452628
|
035 |
|
9 |
|a (OCLCCM-CC)858229362
|
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d YDXCP
|d N$T
|d IUL
|d OCLCO
|d OCLCQ
|d DEBSZ
|d OCLCO
|d OCLCQ
|d OCLCO
|d FEM
|d JBG
|d AGLDB
|d ICA
|d ZCU
|d MERUC
|d OCLCQ
|d D6H
|d OCLCF
|d VTS
|d ICG
|d OCLCQ
|d STF
|d DKC
|d AU@
|d OCLCQ
|d UKAHL
|d OCLCQ
|d K6U
|
049 |
|
|
|a MAIN
|
050 |
|
4 |
|a TK5103.2 .S384 2013
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
100 |
1 |
|
|a Speed, Tim.
|0 http://id.loc.gov/authorities/names/nb2001018757
|
245 |
1 |
0 |
|a Mobile Security :
|b How to secure, privatize and recover your devices /
|c Tim Speed, Darla Nykamp, Mari Heiser, Joseph Anderson, Jaya Nampalli.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2013.
|
300 |
|
|
|a 1 online resource (242 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
0 |
|t Living in a mobile world --
|t Users and mobile device management --
|t Privacy : small word, big consequences --
|t Mobile and social : the threats you should know about --
|t Protecting your mobile devices --
|t Support and warranty insurance --
|t Baby boomers, teens, and tweens --
|t Getting your life back after you've been hacked --
|g Appendix A.
|t IBM notes traveler --
|g Appendix B.
|t Mobile device management --
|g Appendix C.
|t Tips to help you protect your mobile device --
|g Appendix D.
|t Mobile Acceptable Use Policy template --
|g Appendix E.
|t The history of social networking, the Internet, and smartphones.
|
500 |
|
|
|a Encryption on iOS.
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a Learn how to keep yourself safe online with easy- to- follow examples and real- life scenarios. Written by developers at IBM, this guide should be the only resource you need to keep your personal information private. Mobile security is one of the most talked about areas in I.T. today with data being stolen from smartphones and tablets around the world. Make sure you, and your family, are protected when they go online.
|
650 |
|
0 |
|a Cell phones
|x Security measures.
|
650 |
|
0 |
|a Pocket computers
|x Security measures.
|
650 |
|
0 |
|a Wireless communication systems
|x Security measures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Wireless communication systems
|x Security measures.
|2 fast
|0 (OCoLC)fst01176222
|
655 |
|
0 |
|a Electronic books.
|
655 |
|
4 |
|a Electronic books.
|
700 |
1 |
|
|a Nykamp, Darla.
|0 http://id.loc.gov/authorities/names/no2014050966
|
700 |
1 |
|
|a Heiser, Mari.
|0 http://id.loc.gov/authorities/names/no2014050979
|
700 |
1 |
|
|a Anderson, Joseph.
|0 http://id.loc.gov/authorities/names/no2014050963
|
700 |
1 |
|
|a Nampalli, Jaya.
|0 http://id.loc.gov/authorities/names/no2014050984
|
776 |
0 |
8 |
|i Print version:
|a Speed, Timothy.
|t Mobile Security : How to secure, privatize and recover your devices.
|d Birmingham : Packt Publishing, ©2013
|z 9781849693608
|
903 |
|
|
|a HeVa
|
929 |
|
|
|a oclccm
|
999 |
f |
f |
|i caca1dbc-b191-5613-b14b-e46d5b183ad0
|s fc6c1c61-48f5-5960-a0ab-5350cb5edda7
|
928 |
|
|
|t Library of Congress classification
|a TK5103.2 .S384 2013
|l Online
|c UC-FullText
|u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=639456
|z eBooks on EBSCOhost
|g ebooks
|i 12395605
|