005 |
|
20100113131607.0 |
010 |
|
|a 2008042884
|
015 |
|
|aGBA8B9928|2bnb
|
016 |
7
|
|a014778512|2Uk
|
020 |
|
|a1597492981 :|cNT|1723
|
020 |
|
|a9781597492980
|
035 |
|
|a2008042884
|
035 |
|
|a(OCoLC)ocn229025908
|
035 |
|
|a(OCoLC)229025908
|
040 |
|
|aTWNTU|cTWNTU|dTWNTU
|
050 |
00
|
|aTK5102.85|b.M62 2009
|
082 |
00
|
|a005.8|222
|
095 |
|
|aNTTU|bG|cE047531|d005.8|eM687|pBOOK|fCKY|zBOOK|m0|tDDC
|
245 |
00
|
|aMobile malware attacks and defense /|cKen Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.].
|
260 |
|
|aBurlington, MA :|bElsevier,|cc2009.
|
300 |
|
|axxv, 409 p. :|bill. ;|c24 cm.
|
440 |
0
|
|a2009年教育部專案充實圖儀設備購書
|
504 |
|
|aIncludes bibliographical references and index.
|
505 |
0
|
|aIntroduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures.
|
650 |
0
|
|aMobile communication systems|xSecurity measures.
|
650 |
0
|
|aComputer crimes|xPrevention.
|
650 |
0
|
|aComputer hackers.
|
650 |
0
|
|aCell phone systems|xSecurity measures.
|
650 |
0
|
|aComputer crimes|vCase studies.
|
650 |
0
|
|aMobile computing|xSecurity measures.
|
650 |
0
|
|aWireless Internet|xSecurity measures.
|
700 |
1
|
|aDunham, Ken.
|
809 |
|
|d005.8|eM687|tDDC|pBOOK
|
856 |
42
|
|3Publisher description|uhttp://www.loc.gov/catdir/enhancements/fy0901/2008042884-d.html
|