It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 06335cam 2200961Ia 4500
001 ocn460214711
003 OCoLC
005 20200605205803.0
008 091027s2004 enka ob 001 0 eng d
006 m o d
007 cr cnu---unuuu
040 $aN$T$beng$epn$cN$T$dN$T$dOCLCQ$dEBLCP$dIDEBK$dOCLCQ$dYDXCP$dOCLCQ$dMHW$dCOF$dOCLCQ$dNTG$dWPG$dB24X7$dOCLCF$dOCLCE$dCUS$dE7B$dOCLCQ$dNLGGC$dOCLCQ$dDXU$dOCLCQ$dDEBSZ$dOCLCQ$dAGLDB$dUAB$dZ5A$dMERUC$dOCLCA$dOCLCQ$dVTS$dCOO$dOCLCQ$dSTF$dUKAHL$dOL$$dOCLCQ$dUHL$dK6U$dOCLCQ$dUKSSU
019 $a60731791$a62156471$a607015726$a632023007$a646798393$a977450182$a987452274$a987453434$a988782383$a1047921354$a1060197238$a1100943286$a1102561303$a1112978891$a1119083623$a1154912479
020 $a9781849190886$q(electronic bk.)
020 $a1849190887$q(electronic bk.)
020 $z0863413374
020 $z9780863413377
035 $a(OCoLC)460214711$z(OCoLC)60731791$z(OCoLC)62156471$z(OCoLC)607015726$z(OCoLC)632023007$z(OCoLC)646798393$z(OCoLC)977450182$z(OCoLC)987452274$z(OCoLC)987453434$z(OCoLC)988782383$z(OCoLC)1047921354$z(OCoLC)1060197238$z(OCoLC)1100943286$z(OCoLC)1102561303$z(OCoLC)1112978891$z(OCoLC)1119083623$z(OCoLC)1154912479
037 $a432586$bProquest Ebook Central
042 $adlr
050 4 $aQA76.9.A25$bS433 2004eb
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$222
245 00 $aSecurity for mobility /$cedited by Chris J. Mitchell.
260 $aLondon :$bInstitution of Electrical Engineers,$c©2004.
300 $a1 online resource (xxv, 440 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
490 1 $aIET telecommunications series ;$v51
504 $aIncludes bibliographical references and index.
520 $aOver the last decade, mobile telecommunications has grown dramatically from a niche technology to a massive industry. As the mobile phone becomes ubiquitous and the divisions between PCs, personal digital assistants, mobile phones and other mobile devices becomes blurred, the security both of the information handled by these devices and the devices themselves becomes increasingly important. The book consists of 17 chapters covering current developments in security for mobility; underlying technologies; network security; mobile code issues; application security; and the future.
506 $3Use copy$fRestrictions unspecified$2star$5MiAaHDL
533 $aElectronic reproduction.$b[Place of publication not identified] :$cHathiTrust Digital Library,$d2010.$5MiAaHDL
538 $aMaster and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.$uhttp://purl.oclc.org/DLF/benchrepro0212$5MiAaHDL
583 1 $adigitized$c2010$hHathiTrust Digital Library$lcommitted to preserve$2pda$5MiAaHDL
588 0 $aPrint version record.
505 0 $aPart I. Underlying technologies -- Part II. Network security -- Part III. Mobile code issues -- Part IV. Application security -- Part V. The future.
650 0 $aComputer security.
650 0 $aMobile communication systems.
650 6 $aSystèmes informatiques$xSécurité$xMesures.
650 6 $aRadiocommunications mobiles.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
650 7 $aMobile communication systems.$2fast$0(OCoLC)fst01024207
655 4 $aElectronic books.
700 1 $aMitchell, Chris$q(Christopher John)
710 2 $aInstitution of Electrical Engineers.
776 08 $iPrint version:$tSecurity for mobility.$dLondon : Institution of Electrical Engineers, ©2004$z0863413374$z9780863413377$w(DLC) 2006284185$w(OCoLC)53030750
830 0 $aIET telecommunications series ;$v51.
856 40 $3Books24x7$uhttp://www.books24x7.com/marc.asp?isbn=0863413374
856 40 $3Books24x7$uhttp://www.books24x7.com/marc.asp?bookid=7046
856 40 $3Dawsonera$uhttp://www.dawsonera.com/abstract/9781849190886
856 40 $3ebrary$uhttp://site.ebrary.com/id/10277584
856 40 $3EBSCOhost$uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=292220
856 40 $3Google$uhttp://books.google.com/books?id=i-xSAAAAMAAJ
856 40 $3HathiTrust Digital Library, Limited view (search only)$uhttp://catalog.hathitrust.org/api/volumes/oclc/53030750.html
856 40 $3IET$uhttps://doi.org/10.1049/PBTE051E
856 40 $3MyiLibrary$uhttp://www.myilibrary.com?id=201009
856 40 $3ProQuest Ebook Central$uhttps://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=432586
856 40 $3VLeBooks$uhttp://www.vlebooks.com/vleweb/product/openreader?id=none&isbn=9781849190886
856 40 $uhttp://0-digital-library.theiet.org.oasis.unisa.ac.za/content/books/te/pbte051e
856 42 $3Publisher description$uhttp://catdir.loc.gov/catdir/enhancements/fy0651/2006284185-d.html
856 4 $3Available from Skillsoft Books ITPro$idbcode=AALIM; providercode=PRVAEB$uhttps://cornell-library.skillport.com/skillportfe/main.action?assetid=7046
856 4 $uhttps://shu-primo.hosted.exlibrisgroup.com/openurl/44SHU/44SHU_VU1?u.ignore_date_coverage=true&rft.mms_id=9910745502501$p5338621680002501
856 40 $uhttps://catalogue.solent.ac.uk/openurl/44SSU_INST/44SSU_INST:VU1?u.ignore_date_coverage=true&rft.mms_id=990096954080204796$zSeveral people can access this ebook at the same time (up to 325 accesses per year).$aAvailable$p5323751130004796$xUKSoSU
938 $aAskews and Holts Library Services$bASKH$nAH25007217
938 $aBooks 24x7$bB247$nbks00003327
938 $aEBL - Ebook Library$bEBLB$nEBL432586
938 $aebrary$bEBRY$nebr10277584
938 $aEBSCOhost$bEBSC$n292220
938 $aYBP Library Services$bYANK$n3029155
029 1 $aAU@$b000051410835
029 1 $aAU@$b000053223330
029 1 $aDEBBG$bBV043097511
029 1 $aDEBSZ$b421950153
029 1 $aDEBSZ$b45644565X
994 $aZ0$bP4A
948 $hNO HOLDINGS IN P4A - 1333 OTHER HOLDINGS