Hacking exposed mobile security secrets & solutions
Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile...
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | , , |
| Format: | Book |
| Language: | English |
| Published: |
New York
McGraw-Hill
2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 100773 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025553.0 | ||
| 008 | 141013s2013 nyua i 000 0 eng d | ||
| 020 | |a 9780071817011 (pbk) | ||
| 020 | |a 0071817018 (pbk) | ||
| 039 | 9 | |a 201503301324 |b zul |c 201411240841 |d azraai |c 201411201156 |d shahrim |y 201410131529 |z hasniza | |
| 040 | |a UPNM | ||
| 090 | |a TK 5105.59 |b .B47 2013 | ||
| 100 | 1 | |a Bergman, Neil | |
| 245 | 1 | 0 | |a Hacking exposed |b mobile security secrets & solutions |c Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray |
| 260 | |a New York |b McGraw-Hill |c 2013 | ||
| 300 | |a xxvii, 289 p. |b ill. |c 24 cm | ||
| 500 | |a Includes index | ||
| 505 | 0 | |a The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit. | |
| 520 | |a Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. | ||
| 592 | |a 00013777 |b 14/11/2014 |c RM160.00 |h PVK | ||
| 650 | 0 | |a Computer networks |x Security measures | |
| 650 | 0 | |a Mobile computing |x Security measures | |
| 650 | 0 | |a Mobile communication systems |x security measures | |
| 650 | 0 | |a Hackers | |
| 650 | 0 | |a Computer crimes |x Prevention | |
| 700 | 1 | |a Stanfield, Mike | |
| 700 | 1 | |a Rouse, Jason | |
| 700 | 1 | |a Scambray, Joel | |
| 999 | |a vtls000052927 |c 100773 |d 100773 | ||


