Búsqueda

Downloading danger : the growing threat of mobile malware

<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd">
  <record>
    <leader>00000cab a2200000   4500</leader>
    <controlfield tag="001">MAP20160022520</controlfield>
    <controlfield tag="003">MAP</controlfield>
    <controlfield tag="005">20220902102742.0</controlfield>
    <controlfield tag="008">160718e20160718esp|||p      |0|||b|spa d</controlfield>
    <datafield tag="040" ind1=" " ind2=" ">
      <subfield code="a">MAP</subfield>
      <subfield code="b">spa</subfield>
      <subfield code="d">MAP</subfield>
    </datafield>
    <datafield tag="084" ind1=" " ind2=" ">
      <subfield code="a">7</subfield>
    </datafield>
    <datafield tag="100" ind1="1" ind2=" ">
      <subfield code="0">MAPA20140020133</subfield>
      <subfield code="a">Heires, Katherine</subfield>
    </datafield>
    <datafield tag="245" ind1="1" ind2="0">
      <subfield code="a">Downloading danger</subfield>
      <subfield code="b">: the growing threat of mobile malware</subfield>
      <subfield code="c">Katherine Heires</subfield>
    </datafield>
    <datafield tag="520" ind1=" " ind2=" ">
      <subfield code="a">Most people love how their smartphone can provide a single point of access to their personal information, financial data, medical records, photos, videos and gaming apps, as well as work-related email, calendars, documents and other business and professional resources. Unfortunately, hackers and online thieves love smartphones as well, particularly because the easy access that these phones provide can be used to their advantage.</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080574109</subfield>
      <subfield code="a">Telefonía móvil</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080547738</subfield>
      <subfield code="a">Internet</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591526</subfield>
      <subfield code="a">Información privada</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080639136</subfield>
      <subfield code="a">Robo</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080587628</subfield>
      <subfield code="a">Riesgo tecnológico</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080544119</subfield>
      <subfield code="a">Hackers</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080626075</subfield>
      <subfield code="a">Protección de datos personales</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2="4">
      <subfield code="0">MAPA20080591182</subfield>
      <subfield code="a">Gerencia de riesgos</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2=" ">
      <subfield code="0">MAPA20080595296</subfield>
      <subfield code="a">Comercio electrónico</subfield>
    </datafield>
    <datafield tag="650" ind1=" " ind2=" ">
      <subfield code="0">MAPA20080592875</subfield>
      <subfield code="a">Protección de datos</subfield>
    </datafield>
    <datafield tag="773" ind1="0" ind2=" ">
      <subfield code="w">MAP20077000291</subfield>
      <subfield code="t">Risk Management Magazine</subfield>
      <subfield code="d">New York : Risk and Insurance Management Society, 1982-</subfield>
      <subfield code="x">0035-5593</subfield>
      <subfield code="g">28/06/2016 Volumen 63 Número 5 - junio 2016 , p. 27-29</subfield>
    </datafield>
  </record>
</collection>