Android security : (Record no. 3770)

MARC details
000 -LEADER
fixed length control field 03219cam a2200385 i 4500
001 - CONTROL NUMBER
control field 17657992
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240619144939.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180220s2013 flua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013008016
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439896464
Qualifying information (hardback)
Terms of availability GBP44.99
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
-- SFPAGOH
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.774.A53
Item number M678 2013
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Misra, Anmol.
Relator term author
245 10 - TITLE STATEMENT
Title Android security :
Remainder of title attacks and defenses /
Statement of responsibility, etc. authors, Anmol Misra, Abhishek Dubey.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton :
Name of producer, publisher, distributor, manufacturer CRC Press, Taylor & Francis,
Date of production, publication, distribution, manufacture, or copyright notice 2013.
300 ## - PHYSICAL DESCRIPTION
Extent xx, 255 pages :
Other physical details illustrations ;
Dimensions 25 cm
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Source rdacarrier
520 ## - SUMMARY, ETC.
Summary, etc. "Preface xvi Android Security: Attacks and Defenses Audience Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. Support Errata and support for this book are available on the CRC Press website and on our site: www.androidinsecurity.com. Our site will also have downloads for applications and tools created by the user. Sample applications created by the authors are available on our website under the Resource section. Readers should download apk files from our website and use them in conjunction with the text, wherever needed. Username: android Password: ISBN-10 number of the book--1439896461 Structure Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of"--
Assigning source Provided by publisher.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title Android (Electronic resource)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Operating systems (Computers)
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Smartphones
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Mobile computing
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Networking / General
Source of heading or term bisacsh.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Software Development & Engineering / General
Source of heading or term bisacsh.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element COMPUTERS / Security / General
Source of heading or term bisacsh.
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN)
a .b10061757
b 19-08-19
c 31-12-17
998 ## - LOCAL CONTROL INFORMATION (RLIN)
-- m
Operator's initials, OID (RLIN) 31-12-17
Cataloger's initials, CIN (RLIN) m
First date, FD (RLIN) a
-- -
-- eng
-- flu
-- 0
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Total checkouts Full call number Barcode Date last seen Price effective from Koha item type
        PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH PERPUSTAKAAN GUNASAMA HAB PENDIDIKAN TINGGI PAGOH   18/06/2024   QA76.774.A53 M678 2013 SF0002118 18/06/2024 18/06/2024 Books - Printed

Powered by Koha