MARC details
000 -LEADER |
fixed length control field |
03219cam a2200385 i 4500 |
001 - CONTROL NUMBER |
control field |
17657992 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240619144939.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
180220s2013 flua b 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2013008016 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781439896464 |
Qualifying information |
(hardback) |
Terms of availability |
GBP44.99 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
-- |
SFPAGOH |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.774.A53 |
Item number |
M678 2013 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Misra, Anmol. |
Relator term |
author |
245 10 - TITLE STATEMENT |
Title |
Android security : |
Remainder of title |
attacks and defenses / |
Statement of responsibility, etc. |
authors, Anmol Misra, Abhishek Dubey. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Boca Raton : |
Name of producer, publisher, distributor, manufacturer |
CRC Press, Taylor & Francis, |
Date of production, publication, distribution, manufacture, or copyright notice |
2013. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xx, 255 pages : |
Other physical details |
illustrations ; |
Dimensions |
25 cm |
336 ## - CONTENT TYPE |
Content type term |
text |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Source |
rdacarrier |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Preface xvi Android Security: Attacks and Defenses Audience Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. Support Errata and support for this book are available on the CRC Press website and on our site: www.androidinsecurity.com. Our site will also have downloads for applications and tools created by the user. Sample applications created by the authors are available on our website under the Resource section. Readers should download apk files from our website and use them in conjunction with the text, wherever needed. Username: android Password: ISBN-10 number of the book--1439896461 Structure Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of"-- |
Assigning source |
Provided by publisher. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE |
Uniform title |
Android (Electronic resource) |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Operating systems (Computers) |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Smartphones |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Mobile computing |
General subdivision |
Security measures. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTERS / Networking / General |
Source of heading or term |
bisacsh. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTERS / Software Development & Engineering / General |
Source of heading or term |
bisacsh. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTERS / Security / General |
Source of heading or term |
bisacsh. |
907 ## - LOCAL DATA ELEMENT G, LDG (RLIN) |
a |
.b10061757 |
b |
19-08-19 |
c |
31-12-17 |
998 ## - LOCAL CONTROL INFORMATION (RLIN) |
-- |
m |
Operator's initials, OID (RLIN) |
31-12-17 |
Cataloger's initials, CIN (RLIN) |
m |
First date, FD (RLIN) |
a |
-- |
- |
-- |
eng |
-- |
flu |
-- |
0 |