The Resource Hacking Exposed Mobile, Bergman, Neil

Hacking Exposed Mobile, Bergman, Neil

Label
Hacking Exposed Mobile
Title
Hacking Exposed Mobile
Statement of responsibility
Bergman, Neil
Creator
Contributor
Author
Subject
Genre
Language
  • eng
  • eng
Summary
Proven security tactics for today's mobile apps, devices, and networks "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists
http://library.link/vocab/creatorName
Bergman, Neil
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
  • Stanfield, Mike
  • Rouse, Jason
  • Scambray, Joel
  • Geethakumar, Sarath
  • Deshmukh, Swapnil
  • Matsumoto, Scott
  • Steven, John
  • Price, Mike
  • O'Reilly Media Company
http://library.link/vocab/subjectName
  • Information technology
  • Computer security
  • Computer networks
  • Data protection
Label
Hacking Exposed Mobile, Bergman, Neil
Link
https://databases.mvlc.org/connect/oreilly?ID=9780071817011
Instantiates
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Dimensions
unknown
Edition
1st edition
Extent
1 online resource (320 pages)
Form of item
online
Issuing body
Made available through: O'Reilly Media Company.
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
(CaSebORM)9780071817011
System details
Mode of access: World Wide Web
Label
Hacking Exposed Mobile, Bergman, Neil
Link
https://databases.mvlc.org/connect/oreilly?ID=9780071817011
Publication
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Dimensions
unknown
Edition
1st edition
Extent
1 online resource (320 pages)
Form of item
online
Issuing body
Made available through: O'Reilly Media Company.
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Reproduction note
Electronic reproduction.
Specific material designation
remote
System control number
(CaSebORM)9780071817011
System details
Mode of access: World Wide Web

Library Locations

    • Merrimack Valley Library ConsortiumBorrow it
      4 High Street, Suite 175, North Andover, MA, 01845, US
      42.7009413 -71.1255084
Processing Feedback ...