Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--

Android Malware / (Record no. 8662)

MARC details
000 -LEADER
fixed length control field 01329nam a22003377i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20190505124912.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140624s2013 nyuad||| |||| 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781461473930
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781461473947 (ebk.)
040 ## - CATALOGING SOURCE
Description conventions rda
Original cataloging agency FUE
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 22
Classification number 005.84
Item number J.X.A.
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jiang, Xuxian,
Relator term author.
245 10 - TITLE STATEMENT
Title Android Malware /
Statement of responsibility, etc Xuxian Jiang, Yajin Zhou.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York :
Name of publisher, distributor, etc Springer ,
Date of publication, distribution, etc [2013]
264 #4 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Date of publication, distribution, etc c2013.
300 ## - PHYSICAL DESCRIPTION
Extent xi, 44 pages :
Other physical details charts, illustrations ,
Dimensions 24 cm
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
490 1# - SERIES STATEMENT
Series statement SpringerBrieft in computer science
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographic references and index
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction -- 2. A survay of android malware -- 3. Case studies -- 4. Discussion -- 5. Additional reading -- 6. Summary
520 ## - SUMMARY, ETC.
Summary, etc In this book, we present an overview of existing android malware and further systematically characterize their behavior from different perspectives
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer Security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cellular Phone.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Malware (Computer software)
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Zhou, Yajin,
Relator term author.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Springer Brieft in computer science
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract
Uniform Resource Identifier <a href="http://repository.fue.edu.eg/xmlui/handle/123456789/3573">http://repository.fue.edu.eg/xmlui/handle/123456789/3573</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type Books
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Inventory number Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
  Dewey Decimal Classification     Computers & Information Technology ( Computer Science ) Main library Main library A2 24/06/2014 PU   005.84 J.X.A. 00010369 19/02/2025 24/06/2014 Books