000 -LEADER |
fixed length control field |
01942nam a22002417a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20221110045815.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
221110b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781032136127 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
CvSU-CCAT Campus Library. |
Transcribing agency |
CvSU-CCAT Campus Library. |
Description conventions |
rda. |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
English. |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
CIR TK 102.85 |
Item number |
T43 2022 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Thakur, Kutub, author. |
9 (RLIN) |
7313 |
245 ## - TITLE STATEMENT |
Title |
Securing mobile devices and technology / |
Statement of responsibility, etc. |
Kutub Thakur and Al-Sakib Khan Pathan. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Boca Raton : |
Name of publisher, distributor, etc. |
CRC Press, |
Date of publication, distribution, etc. |
c2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xviii, 257 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"This book describes the detailed concepts of mobile security. The first two chapters provide a deeper perspective on communication networks while the rest of the book focuses on different aspects of mobile security, wireless networks, and cellular networks. This book also explores issues of mobile, IoT (Internet of Things) devices for shopping and password management and threats related to these devices. A few chapters are fully dedicated to the cellular technology wireless network. The management of password for the mobile with the modern technologies that helps on how to create and manage passwords more effectively is also described in full detail. This book also covers aspects of wireless networks and their security mechanisms. The details of the routers and the most commonly used Wi-Fi routers are provided with some step-by-step procedures to configure and secure them more efficiently. This book will offer great benefits to the students of graduate and undergraduate classes, researchers, and also practitioners"-- Provided by publisher |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Accession number |
13090 |
546 ## - LANGUAGE NOTE |
Language note |
In English text. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Mobile communication systems |
General subdivision |
Security measures. |
9 (RLIN) |
7314 |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Pathan, Al-Sakib Khan, author. |
9 (RLIN) |
7315 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Book |
Classification part |
TK 102.85 T43 2022 |
Call number prefix |
CIR |