000 -LEADER |
fixed length control field |
02532nam a22004455i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310143337.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
120328s2012 xxu| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781461416500 |
|
978-1-4614-1650-0 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
621.382 |
Edition number |
23 |
264 #1 - |
-- |
Boston, MA : |
-- |
Springer US, |
-- |
2012. |
912 ## - |
-- |
ZDB-2-ENG |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Androulidakis, Iosif I. |
Relator term |
author. |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Mobile Phone Security and Forensics |
Medium |
[electronic resource] : |
Remainder of title |
A Practical Approach / |
Statement of responsibility, etc |
by Iosif I. Androulidakis. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XI, 103 p. 39 illus. |
Other physical details |
online resource. |
440 1# - SERIES STATEMENT/ADDED ENTRY--TITLE |
Title |
SpringerBriefs in Electrical and Computer Engineering, |
International Standard Serial Number |
2191-8112 |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction -- Confidentiality -- Integrity and Availability Threats in Mobile Phones -- A multinational survey on users’ practices, perceptions and awareness regarding mobile phone security -- Voice, SMS and identification data interception in GSM -- Software and Hardware Mobile phone tricks -- SMS security issues -- Mobile Phone Forensics -- Conclusion. |
520 ## - SUMMARY, ETC. |
Summary, etc |
Mobile Phone Security and Forensics provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used “against” users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Engineering. |
|
Topical term or geographic name as entry element |
Forensic medicine. |
|
Topical term or geographic name as entry element |
Data protection. |
|
Topical term or geographic name as entry element |
Telecommunication. |
|
Topical term or geographic name as entry element |
Engineering. |
|
Topical term or geographic name as entry element |
Communications Engineering, Networks. |
|
Topical term or geographic name as entry element |
Systems and Data Security. |
|
Topical term or geographic name as entry element |
Security Science and Technology. |
|
Topical term or geographic name as entry element |
Forensic Science. |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781461416494 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-1-4614-1650-0 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |