Cargando…

The mobile application hacker's handbook /

This is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a pro...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Chell, Dominic (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : John Wiley & Sons, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn908032082
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 150427s2015 inua o 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d N$T  |d CDX  |d DEBBG  |d IDEBK  |d YDXCP  |d DG1  |d OCLCF  |d DEBSZ  |d TEFOD  |d COO  |d DG1  |d LIP  |d OCLCQ  |d OCLCO  |d CEF  |d DEHBZ  |d CRU  |d OCLCQ  |d U3W  |d OCLCQ  |d UAB  |d OCLCQ  |d EYM  |d OCLCO  |d OCLCQ 
019 |a 911846904  |a 966385693 
020 |a 9781119183655  |q (electronic bk.) 
020 |a 1119183650  |q (electronic bk.) 
020 |a 9781118958520  |q (electronic bk.) 
020 |a 1118958527  |q (electronic bk.) 
020 |a 9781118958513  |q (electronic bk.) 
020 |a 1118958519  |q (electronic bk.) 
020 |z 1118958500 
020 |z 9781118958506 
020 |z 1118958519 
029 1 |a AU@  |b 000056946068 
029 1 |a CHNEW  |b 000944238 
029 1 |a CHVBK  |b 480244707 
029 1 |a DEBBG  |b BV042683237 
029 1 |a DEBBG  |b BV043397742 
029 1 |a DEBSZ  |b 446584428 
029 1 |a DEBSZ  |b 453331726 
029 1 |a DEBSZ  |b 468874844 
029 1 |a GBVCP  |b 832465437 
029 1 |a AU@  |b 000073147255 
035 |a (OCoLC)908032082  |z (OCoLC)911846904  |z (OCoLC)966385693 
037 |a CL0500000582  |b Safari Books Online 
037 |a F1298CC5-7E83-41D4-B482-2E5E17B2CCE4  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.59 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |2 ukslc 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Chell, Dominic,  |e author. 
245 1 4 |a The mobile application hacker's handbook /  |c Dominic Chell ... [and three others]. 
264 1 |a Indianapolis, IN :  |b John Wiley & Sons,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
500 |a Includes index. 
505 0 |a Mobile application (in)security -- Analyzing IOS applications -- Attacking IOS applications -- Identifying IOS implementation insecurities -- Writing secure IOS applications -- Analyzing Android applications -- Attacking Android applications -- Identifying and exploiting Android implementation issues -- Writing secure Android applications -- Analyzing Windows Phone applications -- Attacking Windows Phone applications -- Identifying Windows Phone implementation issues -- Writing secure Windows Phone applications -- Analyzing BlackBerry applications -- Attacking BlackBerry applications -- Identifying BlackBerry application issues -- Writing secure BlackBerry applications -- Cross-platform mobile applications. 
520 |a This is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. --  |c Edited summary from book. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Mobile computing. 
650 0 |a Mobile apps. 
650 0 |a Hacking. 
650 6 |a Informatique mobile. 
650 6 |a Applications mobiles. 
650 6 |a Piratage informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Mobile apps.  |2 fast  |0 (OCoLC)fst01909896 
650 7 |a Mobile computing.  |2 fast  |0 (OCoLC)fst01024221 
776 0 8 |i Print version:  |a Chell, Dominic.  |t Mobile application hacker's handbook.  |d Indianapolis, IN : John Wiley & Sons, ©2015  |z 9781118958506  |w (OCoLC)885229394 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781118958513/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Coutts Information Services  |b COUT  |n 31853972 
938 |a EBSCOhost  |b EBSC  |n 1016323 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis31853972 
938 |a YBP Library Services  |b YANK  |n 12486817 
938 |a YBP Library Services  |b YANK  |n 12580754 
994 |a 92  |b IZTAP