000 01702nam a22004097a 4500
999 _c64216
_d64216
001 15467302
003 CITU
005 20210514082704.0
008 080929s2009 maua b 001 0 eng
010 _a 2008042884
015 _aGBA8B9928
_2bnb
016 7 _a014778512
_2Uk
020 _a9781597492980
020 _a1597492981
035 _a(OCoLC)229025908
035 _a(OCoLC)ocn229025908
040 _aDLC
_cDLC
_dBTCTA
_dBAKER
_dYDXCP
_dUKM
_dC#P
_dBWX
_dDLC
050 0 0 _aTK5102.85
_b.M62 2009
082 0 0 _a005.8
_222
245 0 0 _aMobile malware attacks and defense /
_cKen Dunham... [et al.].
264 1 _aRockland, MA :
_bSyngress,
_cc2009.
300 _axxv, 409 pages :
_billustrations ;
_c24 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures.
650 0 _aCell phone systems
_xSecurity measures.
650 0 _aMobile communication systems
_xSecurity measures.
650 0 _aMobile computing
_xSecurity measures.
650 0 _aComputer crimes
_xPrevention.
650 0 _aComputer crimes
_vCase studies.
650 0 _aHackers.
650 0 _aWireless Internet
_xSecurity measures.
700 1 _aDunham, Ken,
_eauthor.
942 _2ddc
_cBK