Hacking exposed mobile security secrets & solutions

Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile...

Full description

Saved in:
Bibliographic Details
Main Author: Bergman, Neil
Other Authors: Stanfield, Mike, Rouse, Jason, Scambray, Joel
Format: Book
Language:English
Published: New York McGraw-Hill 2013
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 100773
003 MY-KLNDU
005 20241220025553.0
008 141013s2013 nyua i 000 0 eng d
020 |a 9780071817011 (pbk) 
020 |a 0071817018 (pbk) 
039 9 |a 201503301324  |b zul  |c 201411240841  |d azraai  |c 201411201156  |d shahrim  |y 201410131529  |z hasniza 
040 |a UPNM 
090 |a TK 5105.59  |b .B47 2013 
100 1 |a Bergman, Neil 
245 1 0 |a Hacking exposed  |b mobile security secrets & solutions  |c Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray 
260 |a New York  |b McGraw-Hill  |c 2013 
300 |a xxvii, 289 p.  |b ill.  |c 24 cm 
500 |a Includes index 
505 0 |a The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit. 
520 |a Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. 
592 |a 00013777  |b 14/11/2014  |c RM160.00  |h PVK 
650 0 |a Computer networks  |x Security measures 
650 0 |a Mobile computing  |x Security measures 
650 0 |a Mobile communication systems  |x security measures 
650 0 |a Hackers 
650 0 |a Computer crimes  |x Prevention 
700 1 |a Stanfield, Mike 
700 1 |a Rouse, Jason 
700 1 |a Scambray, Joel 
999 |a vtls000052927  |c 100773  |d 100773