LEADER 00000cam a2200793 a 4500 001 793291729 003 OCoLC 005 20240129213017.0 006 m o d 007 cr unu|||||||| 008 120508s2009 maua ob 001 0 eng d 019 316223880|a630923264 020 1597492981 020 9781597492980 020 9780080949192|q(electronic bk.) 020 0080949193|q(electronic bk.) 029 1 AU@|b000045592887 029 1 DEBBG|bBV039828799 029 1 DEBBG|bBV040902068 029 1 DEBSZ|b378295179 029 1 DEBSZ|b381381323 035 (OCoLC)793291729|z(OCoLC)316223880|z(OCoLC)630923264 037 CL0500000137|bSafari Books Online 037 4D9C4755-B31C-4066-83BC-D1D506527F73|bOverDrive, Inc. |nhttp://www.overdrive.com 040 UMI|beng|epn|cUMI|dOCLCQ|dDEBSZ|dOCLCA|dOCLCO|dN$T|dYDXCP |dIDEBK|dAU@|dDEBBG|dUBY|dTEFOD|dOCLCO|dTEFOD|dOCLCO |dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dOCLCA|dOCLCF|dCEF |dOCLCO|dOCLCQ|dOCLCO|dOCLCQ 049 INap 082 04 005.8 082 04 005.8|222 099 eBook O’Reilly for Public Libraries 245 00 Mobile malware attacks and defense /|cKen Dunham, technical editor ; Saeed Abu-Nimeh [and others]. |h[O'Reilly electronic resource] 260 Burlington, MA :|bSyngress Pub.,|c©2009. 300 1 online resource (xxv, 409 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 504 Includes bibliographical references and index. 505 0 Introduction to mobile malware -- Visual payloads -- Timeline of mobile malware, hoaxes, and threats -- Overview of mobile malware families -- Taxonomy of mobile malware -- Phishing, SMishing, and vishing -- Operating system and device vulnerabilities -- Analyzing mobile malware -- Forensic analysis of mobile malware -- Debugging and disassembly of MMC -- Mobile malware mitigation measures. 520 Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Cell phone systems|xSecurity measures. 650 0 Mobile communication systems|xSecurity measures. 650 0 Mobile computing|xSecurity measures. 650 0 Computer crimes|xPrevention. 650 0 Computer crimes|vCase studies. 650 0 Hackers. 650 0 Wireless Internet|xSecurity measures. 650 6 Téléphonie cellulaire|xSécurité|xMesures. 650 6 Radiocommunications mobiles|xSécurité|xMesures. 650 6 Informatique mobile|xSécurité|xMesures. 650 6 Criminalité informatique|vÉtudes de cas. 650 6 Pirates informatiques. 650 6 Internet mobile|xSécurité|xMesures. 650 7 Computer crimes|2fast 650 7 Computer crimes|xPrevention|2fast 650 7 Hackers|2fast 655 7 Case studies|2fast 700 1 Dunham, Ken. 700 1 Abu-Nimeh, Saeed. 776 08 |iPrint version:|tMobile malware attacks and defense. |dBurlington, MA : Elsevier, ©2009|z9781597492980|w(DLC) 2008042884|w(OCoLC)229025908 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781597492980/?ar |zAvailable on O'Reilly for Public Libraries 938 EBSCOhost|bEBSC|n249331 938 YBP Library Services|bYANK|n2935214 994 92|bJFN