Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200793 a 4500 
001    793291729 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr unu|||||||| 
008    120508s2009    maua    ob    001 0 eng d 
019    316223880|a630923264 
020    1597492981 
020    9781597492980 
020    9780080949192|q(electronic bk.) 
020    0080949193|q(electronic bk.) 
029 1  AU@|b000045592887 
029 1  DEBBG|bBV039828799 
029 1  DEBBG|bBV040902068 
029 1  DEBSZ|b378295179 
029 1  DEBSZ|b381381323 
035    (OCoLC)793291729|z(OCoLC)316223880|z(OCoLC)630923264 
037    CL0500000137|bSafari Books Online 
037    4D9C4755-B31C-4066-83BC-D1D506527F73|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    UMI|beng|epn|cUMI|dOCLCQ|dDEBSZ|dOCLCA|dOCLCO|dN$T|dYDXCP
       |dIDEBK|dAU@|dDEBBG|dUBY|dTEFOD|dOCLCO|dTEFOD|dOCLCO
       |dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dOCLCA|dOCLCF|dCEF
       |dOCLCO|dOCLCQ|dOCLCO|dOCLCQ 
049    INap 
082 04 005.8 
082 04 005.8|222 
099    eBook O’Reilly for Public Libraries 
245 00 Mobile malware attacks and defense /|cKen Dunham, 
       technical editor ; Saeed Abu-Nimeh [and others].
       |h[O'Reilly electronic resource] 
260    Burlington, MA :|bSyngress Pub.,|c©2009. 
300    1 online resource (xxv, 409 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  Introduction to mobile malware -- Visual payloads -- 
       Timeline of mobile malware, hoaxes, and threats -- 
       Overview of mobile malware families -- Taxonomy of mobile 
       malware -- Phishing, SMishing, and vishing -- Operating 
       system and device vulnerabilities -- Analyzing mobile 
       malware -- Forensic analysis of mobile malware -- 
       Debugging and disassembly of MMC -- Mobile malware 
       mitigation measures. 
520    Malware has gone mobile, and the security landscape is 
       changing quickly with emerging attacks on cell phones, 
       PDAs, and other mobile devices. This first book on the 
       growing threat covers a wide range of malware targeting 
       operating systems like Symbian and new devices like the 
       iPhone. Examining code in past, current, and future risks,
       protect your banking, auctioning, and other activities 
       performed on mobile devices. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Cell phone systems|xSecurity measures. 
650  0 Mobile communication systems|xSecurity measures. 
650  0 Mobile computing|xSecurity measures. 
650  0 Computer crimes|xPrevention. 
650  0 Computer crimes|vCase studies. 
650  0 Hackers. 
650  0 Wireless Internet|xSecurity measures. 
650  6 Téléphonie cellulaire|xSécurité|xMesures. 
650  6 Radiocommunications mobiles|xSécurité|xMesures. 
650  6 Informatique mobile|xSécurité|xMesures. 
650  6 Criminalité informatique|vÉtudes de cas. 
650  6 Pirates informatiques. 
650  6 Internet mobile|xSécurité|xMesures. 
650  7 Computer crimes|2fast 
650  7 Computer crimes|xPrevention|2fast 
650  7 Hackers|2fast 
655  7 Case studies|2fast 
700 1  Dunham, Ken. 
700 1  Abu-Nimeh, Saeed. 
776 08 |iPrint version:|tMobile malware attacks and defense.
       |dBurlington, MA : Elsevier, ©2009|z9781597492980|w(DLC)  
       2008042884|w(OCoLC)229025908 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781597492980/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    EBSCOhost|bEBSC|n249331 
938    YBP Library Services|bYANK|n2935214 
994    92|bJFN