Virtualization techniques for mobile systems / (Record no. 19499)

MARC details
000 -LEADER
fixed length control field 02156cam a22003135a 4500
001 - CONTROL NUMBER
control field ssj0001237577
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20150609114206.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 140519t2014 gw dko frb 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319057415 (eBook)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319057408
040 ## - CATALOGING SOURCE
Original cataloging agency WaSeSS
Language of cataloging eng
Transcribing agency WaSeSS
Modifying agency WaSeSS
-- EG-ScBUE
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004.6
Edition number 22
Item number JAR
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Jaramillo, David.
9 (RLIN) 38126
245 10 - TITLE STATEMENT
Title Virtualization techniques for mobile systems /
Statement of responsibility, etc David Jaramillo, Borko Furht, Ankur Agarwal.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Cham :
Name of publisher, distributor, etc Springer International Publishing,
Date of publication, distribution, etc c.2014.
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 73 p. :
Other physical details charts, forms, photographs ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement Multimedia systems and applications
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Bibliography : p. 69-73.
520 ## - SUMMARY, ETC.
Summary, etc This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile communication systems.
Source of heading or term BUEsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Virtual computer systems.
Source of heading or term BUEsh
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Source of heading or term BUEsh
653 ## - INDEX TERM--UNCONTROLLED
Resource For college Engineering, General
-- Informatics and Computer Science
Arrived date list June2015
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Form subdivision Reading book
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Furht, Borko.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Agarwal, Ankur.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Koha collection Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Koha item type
    Dewey Decimal Classification     Baccah Central Library Central Library Lower Floor 08/06/2015 Purchase   004.6 JAR 000038427 12/02/2024 Book - Borrowing