|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn864714007 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
131205s2013 nyua ob 001 0 eng |
040 |
|
|
|a NRC
|b eng
|e rda
|e pn
|c NRC
|d IDEBK
|d UMI
|d COO
|d B24X7
|d OCLCO
|d DEBBG
|d DEBSZ
|d VT2
|d CDX
|d OCLCA
|d OCLCO
|d YDXCP
|d TEFOD
|d OCLCQ
|d OCLCO
|d TEFOD
|d OCLCQ
|d OCLCA
|d EBLCP
|d OCLCF
|d TOH
|d RDF
|d OCLCQ
|d D6H
|d LIV
|d N$T
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 857713646
|a 865474288
|a 1084403930
|a 1249693798
|
020 |
|
|
|a 1299826350
|q (electronic bk.)
|
020 |
|
|
|a 9781299826359
|q (electronic bk.)
|
020 |
|
|
|a 9780071817028
|q (electronic bk.)
|
020 |
|
|
|a 0071817026
|q (electronic bk.)
|
020 |
|
|
|z 0071817018
|q (paperback)
|
020 |
|
|
|z 9780071817011
|q (paperback)
|
029 |
1 |
|
|a AU@
|b 000052404254
|
029 |
1 |
|
|a AU@
|b 000053305538
|
029 |
1 |
|
|a DEBSZ
|b 404324991
|
035 |
|
|
|a (OCoLC)864714007
|z (OCoLC)857713646
|z (OCoLC)865474288
|z (OCoLC)1084403930
|z (OCoLC)1249693798
|
037 |
|
|
|a 513886
|b MIL
|
037 |
|
|
|a 504CBA64-0756-4CF3-86FC-2C82540E778E
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a TK5105.59
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a COM043050
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Bergman, Neil.
|
245 |
1 |
0 |
|a Hacking exposed :
|b mobile security secrets & solutions /
|c Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray.
|
264 |
|
1 |
|a New York :
|b McGraw-Hill,
|c [2013]
|
300 |
|
|
|a 1 online resource (xxvii, 289 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a The secure beginner's guides: security smarts for the self-guided IT professional
|
520 |
2 |
|
|a "Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"--
|c Provided by publisher
|
520 |
2 |
|
|a "Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"--
|c Provided by publisher
|
500 |
|
|
|a Includes index.
|
588 |
0 |
|
|a Print version record.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Mobile computing
|x Security measures.
|
650 |
|
0 |
|a Mobile communication systems
|x Security measures.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
0 |
|a Computer crimes
|x Prevention.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Informatique mobile
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Radiocommunications mobiles
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Pirates informatiques.
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer crimes
|x Prevention.
|2 fast
|0 (OCoLC)fst00872068
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Hackers.
|2 fast
|0 (OCoLC)fst00872150
|
700 |
1 |
|
|a Stanfield, Mike.
|
700 |
1 |
|
|a Rouse, Jason.
|
700 |
1 |
|
|a Scambray, Joel.
|
776 |
0 |
8 |
|i Print version:
|a Bergman, Neil.
|t Hacking exposed.
|d New York : McGraw-Hill, [2013]
|z 9780071817011
|w (DLC) 2013024712
|w (OCoLC)820788017
|
830 |
|
0 |
|a Secure beginner's guides.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780071817011/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00057466
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 26088257
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL4958413
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2686419
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis26088257
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12087509
|
994 |
|
|
|a 92
|b IZTAP
|