The mobile application hacker's handbook /
This is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a pro...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
John Wiley & Sons,
[2015]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn908032082 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 150427s2015 inua o 001 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d N$T |d CDX |d DEBBG |d IDEBK |d YDXCP |d DG1 |d OCLCF |d DEBSZ |d TEFOD |d COO |d DG1 |d LIP |d OCLCQ |d OCLCO |d CEF |d DEHBZ |d CRU |d OCLCQ |d U3W |d OCLCQ |d UAB |d OCLCQ |d EYM |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 911846904 |a 966385693 | ||
020 | |a 9781119183655 |q (electronic bk.) | ||
020 | |a 1119183650 |q (electronic bk.) | ||
020 | |a 9781118958520 |q (electronic bk.) | ||
020 | |a 1118958527 |q (electronic bk.) | ||
020 | |a 9781118958513 |q (electronic bk.) | ||
020 | |a 1118958519 |q (electronic bk.) | ||
020 | |z 1118958500 | ||
020 | |z 9781118958506 | ||
020 | |z 1118958519 | ||
029 | 1 | |a AU@ |b 000056946068 | |
029 | 1 | |a CHNEW |b 000944238 | |
029 | 1 | |a CHVBK |b 480244707 | |
029 | 1 | |a DEBBG |b BV042683237 | |
029 | 1 | |a DEBBG |b BV043397742 | |
029 | 1 | |a DEBSZ |b 446584428 | |
029 | 1 | |a DEBSZ |b 453331726 | |
029 | 1 | |a DEBSZ |b 468874844 | |
029 | 1 | |a GBVCP |b 832465437 | |
029 | 1 | |a AU@ |b 000073147255 | |
035 | |a (OCoLC)908032082 |z (OCoLC)911846904 |z (OCoLC)966385693 | ||
037 | |a CL0500000582 |b Safari Books Online | ||
037 | |a F1298CC5-7E83-41D4-B482-2E5E17B2CCE4 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.59 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
072 | 7 | |a COM |2 ukslc | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Chell, Dominic, |e author. | |
245 | 1 | 4 | |a The mobile application hacker's handbook / |c Dominic Chell ... [and three others]. |
264 | 1 | |a Indianapolis, IN : |b John Wiley & Sons, |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
500 | |a Includes index. | ||
505 | 0 | |a Mobile application (in)security -- Analyzing IOS applications -- Attacking IOS applications -- Identifying IOS implementation insecurities -- Writing secure IOS applications -- Analyzing Android applications -- Attacking Android applications -- Identifying and exploiting Android implementation issues -- Writing secure Android applications -- Analyzing Windows Phone applications -- Attacking Windows Phone applications -- Identifying Windows Phone implementation issues -- Writing secure Windows Phone applications -- Analyzing BlackBerry applications -- Attacking BlackBerry applications -- Identifying BlackBerry application issues -- Writing secure BlackBerry applications -- Cross-platform mobile applications. | |
520 | |a This is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. -- |c Edited summary from book. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Mobile computing. | |
650 | 0 | |a Mobile apps. | |
650 | 0 | |a Hacking. | |
650 | 6 | |a Informatique mobile. | |
650 | 6 | |a Applications mobiles. | |
650 | 6 | |a Piratage informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Hacking |2 fast | |
650 | 7 | |a Mobile apps |2 fast | |
650 | 7 | |a Mobile computing |2 fast | |
758 | |i has work: |a The Mobile application hacker's handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYVk4ktKKHjDTv6tX33TgX |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Chell, Dominic. |t Mobile application hacker's handbook. |d Indianapolis, IN : John Wiley & Sons, ©2015 |z 9781118958506 |w (OCoLC)885229394 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118958513/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1895167 |z Texto completo |
938 | |a Coutts Information Services |b COUT |n 31853972 | ||
938 | |a EBSCOhost |b EBSC |n 1016323 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis31853972 | ||
938 | |a YBP Library Services |b YANK |n 12486817 | ||
938 | |a YBP Library Services |b YANK |n 12580754 | ||
994 | |a 92 |b IZTAP |