Cargando…

Mobile application security /

"Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platfor...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Dwivedi, Himanshu
Otros Autores: Clark, Chris, 1980-, Thiel, David V.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York : McGraw-Hill, ©2010.
Colección:IT Pro.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn593356387
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 100402s2010 nyua ob 001 0 eng d
010 |a  2009051530 
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d UMI  |d E7B  |d COO  |d CEF  |d OCLCQ  |d MUQ  |d OCLCQ  |d B24X7  |d DEBSZ  |d OCLCQ  |d TEFOD  |d OCLCQ  |d NXW  |d PR$  |d OCLCQ  |d TEFOD  |d OCLCQ  |d EBLCP  |d ESU  |d OCLCQ  |d TOH  |d VT2  |d C6I  |d UHL  |d OCLCQ  |d UKAHL  |d OCLCO  |d OCLCF  |d OCLCQ 
015 |a GBA9B5341  |2 bnb 
016 7 |a 015432573  |2 Uk 
019 |a 647895205  |a 670428518  |a 685059085  |a 712988145  |a 867667314  |a 1103263725  |a 1113676312  |a 1129375930  |a 1152971899  |a 1192338831  |a 1240523515 
020 |a 9780071633574  |q (electronic bk.) 
020 |a 007163357X  |q (electronic bk.) 
020 |z 0071633561 
020 |z 9780071633567 
029 1 |a AU@  |b 000047156124 
029 1 |a AU@  |b 000053260373 
029 1 |a DEBSZ  |b 355394073 
029 1 |a HEBIS  |b 291467458 
029 1 |a NZ1  |b 13702604 
029 1 |a AU@  |b 000065313459 
035 |a (OCoLC)593356387  |z (OCoLC)647895205  |z (OCoLC)670428518  |z (OCoLC)685059085  |z (OCoLC)712988145  |z (OCoLC)867667314  |z (OCoLC)1103263725  |z (OCoLC)1113676312  |z (OCoLC)1129375930  |z (OCoLC)1152971899  |z (OCoLC)1192338831  |z (OCoLC)1240523515 
037 |a CL0500000075  |b Safari Books Online 
037 |a E0CBDB85-26BC-45A4-922A-15355B9EB20D  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a TK5102.85  |b .D88 2010eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Dwivedi, Himanshu. 
245 1 0 |a Mobile application security /  |c Himanshu Dwivedi, Chris Clark, David Thiel. 
260 |a New York :  |b McGraw-Hill,  |c ©2010. 
300 |a 1 online resource (xxii, 408 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
520 |a "Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource"--Resource description page. 
588 0 |a Print version record. 
505 0 |a Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication -- Contents -- Acknowledgments -- Introduction -- Part I Mobile Platforms -- Chapter 1 Top Mobile Issues and Development Strategies -- Top Issues Facing Mobile Devices -- Physical Security -- Secure Data Storage (on Disk) -- Strong Authentication with Poor Keyboards -- Multiple-User Support with Security -- Safe Browsing Environment -- Secure Operating Systems -- Application Isolation -- Information Disclosure -- Virus, Worms, Trojans, Spyware, and Malware -- Difficult Patching/Update Process 
505 8 |a Strict Use and Enforcement of SSL -- Phishing -- Cross-Site Request Forgery (CSRF) -- Location Privacy/Security -- Insecure Device Drivers -- Multifactor Authentication -- Tips for Secure Mobile Application Development -- Leverage TLS/SSL -- Follow Secure Programming Practices -- Validate Input -- Leverage the Permissions Model Used by the OS -- Use the Least Privilege Model for System Access -- Store Sensitive Information Properly -- Sign the Application's Code -- Figure Out a Secure and Strong Update Process -- Understand the Mobile Browser's Security Strengths and Limitations 
505 8 |a Zero Out the Nonthreats -- Use Secure/Intuitive Mobile URLs -- Conclusion -- Chapter 2 Android Security -- Development and Debugging on Android -- Android's Securable IPC Mechanisms -- Activities -- Broadcasts -- Services -- ContentProviders -- Binder -- Android's Security Model -- Android Permissions Review -- Creating New Manifest Permissions -- Intents -- Intent Review -- IntentFilters -- Activities -- Broadcasts -- Receiving Broadcast Intents -- Safely Sending Broadcast Intents -- Sticky Broadcasts -- Services -- ContentProviders -- Avoiding SQL Injection -- Intent Reflection 
505 8 |a Files and Preferences -- Mass Storage -- Binder Interfaces -- Security by Caller Permission or Identity Checking -- Binder Reference Security -- Android Security Tools -- Manifest Explorer -- Package Play -- Intent Sniffer -- Intent Fuzzer -- Conclusion -- Chapter 3 The Apple iPhone -- History -- The iPhone and OS X -- Breaking Out, Breaking In -- iPhone SDK -- Future -- Development -- Decompilation and Disassembly -- Preventing Reverse-Engineering -- Security Testing -- Buffer Overflows -- Integer Overflows -- Format String Attacks -- Double-Frees -- Static Analysis -- Application Format 
505 8 |a Build and Packaging -- Distribution: The Apple Store -- Code Signing -- Executing Unsigned Code -- Permissions and User Controls -- Sandboxing -- Exploit Mitigation -- Permissions -- Local Data Storage: Files, Permissions, and Encryption -- SQLite Storage -- iPhone Keychain Storage -- Shared Keychain Storage -- Adding Certificates to the Certificate Store -- Acquiring Entropy -- Networking -- The URL Loading API -- NSStreams -- Peer to Peer (P2P) -- Push Notifications, Copy/Paste, and Other IPC -- Push Notifications -- UIPasteboard -- Conclusion -- Chapter 4 Windows Mobile Security 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Mobile communication systems  |x Security measures. 
650 0 |a Mobile computing  |x Security measures. 
650 0 |a Mobile communication systems. 
650 0 |a Mobile computing. 
650 6 |a Radiocommunications mobiles. 
650 6 |a Informatique mobile. 
650 6 |a Radiocommunications mobiles  |x Sécurité  |x Mesures. 
650 6 |a Informatique mobile  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Mobile communication systems  |x Security measures.  |2 blmlsh 
650 7 |a Mobile computing  |x Security measures.  |2 blmlsh 
650 7 |a Mobile communication systems.  |2 fast  |0 (OCoLC)fst01024207 
650 7 |a Mobile computing.  |2 fast  |0 (OCoLC)fst01024221 
700 1 |a Clark, Chris,  |d 1980- 
700 1 |a Thiel, David V. 
776 0 8 |i Print version:  |a Dwivedi, Himanshu.  |t Mobile application security.  |d New York : McGraw-Hill, ©2010  |z 9780071633567  |w (DLC) 2009051530  |w (OCoLC)496159950 
830 0 |a IT Pro. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071633567/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6258940 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26367929 
938 |a Books 24x7  |b B247  |n bks00035970 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4657893 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4668192 
938 |a ebrary  |b EBRY  |n ebr10373316 
938 |a EBSCOhost  |b EBSC  |n 315674 
938 |a YBP Library Services  |b YANK  |n 3200982 
994 |a 92  |b IZTAP