Software test attacks to break mobile and embedded devices
The book guides you step by step starting with the basics. It explains patterns and techniques ranging from simple mind mapping to sophisticated test labs. For traditional testers moving into the mobile and embedded area, the book bridges the gap between IT and mobile/embedded system testing. It ill...
Saved in:
| Main Author: | Hagar, Jon Duncan (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton
CRC Press, Taylor & Francis Group
2017
|
| Series: | Chapman & Hall/CRC innovations in software engineering and software development series
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Advanced penetration testing hacking the world's most secure networks
by: Allsopp, Wil
Published: (2017)
by: Allsopp, Wil
Published: (2017)
Computer and information security handbook
Published: (2009)
Published: (2009)
Computer and information security handbook
Published: (2013)
Published: (2013)
Learning Kali Linux security testing, penetration testing, and ethical hacking
by: Messier, Ric
Published: (2018)
by: Messier, Ric
Published: (2018)
Learn ethical hacking from scratch your stepping stone to penetration testing
by: Sabih, Zaid
Published: (2018)
by: Sabih, Zaid
Published: (2018)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Hacking with kali practical penetration testing techniques
by: Broad, James
Published: (2014)
by: Broad, James
Published: (2014)
Hands-on ethical hacking and network defense
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
by: Simpson, Michael T. 1954-, et al.
Published: (2021)
The basics of web hacking tools and techniques to attack the web
by: Pauli, Joshua J.
Published: (2013)
by: Pauli, Joshua J.
Published: (2013)
Network scanning cookbook practical network security using Nmap and Nessus 7
by: Sairam, Jetty
Published: (2018)
by: Sairam, Jetty
Published: (2018)
Managing information security
Published: (2014)
Published: (2014)
Practical Mobile Forensics Forensically investigate and analyze iOS, Android, and Windows 10 devices
by: Tamma, Rohit, et al.
Published: (2020)
by: Tamma, Rohit, et al.
Published: (2020)
How to break Web software functional and security testing of Web applications and Web services
by: Andrews, Mike
Published: (2006)
by: Andrews, Mike
Published: (2006)
Hacking exposed mobile security secrets & solutions
by: Bergman, Neil
Published: (2013)
by: Bergman, Neil
Published: (2013)
mCommerce security a beginner's guide
by: RainalhKapil
by: RainalhKapil
Embedded systems and software validation
by: Roychoudhury, Abhik
Published: (2009)
by: Roychoudhury, Abhik
Published: (2009)
The basics of hacking and penetration testing ethical hacking and penetration testing made easy
by: Engebretson, Pat (Patrick Henry)
Published: (2013)
by: Engebretson, Pat (Patrick Henry)
Published: (2013)
Metasploit bootcamp a fast-paced guide to enhance your pentesting skills
by: Jaswal, Nipun
Published: (2017)
by: Jaswal, Nipun
Published: (2017)
Applied approach to privacy and security for the internet of things
Published: (2020)
Published: (2020)
Network attacks and exploitation a framework
by: Monte, Matthew
Published: (2015)
by: Monte, Matthew
Published: (2015)
SQL injection attacks and defense
by: Clarke, Justin
Published: (2012)
by: Clarke, Justin
Published: (2012)
Ninja hacking unconventional penetration testing tactics and techniques
by: Wilhelm, Thomas
Published: (2011)
by: Wilhelm, Thomas
Published: (2011)
Security and software for cybercafes
Published: (2008)
Published: (2008)
Cybersecurity, attack and defense strategies infrastructure security with Red Team and Blue Team tactics
by: Diogenes, Yuri, et al.
Published: (2018)
by: Diogenes, Yuri, et al.
Published: (2018)
Build your own security lab a field guide for network testing
by: Gregg ,Michaelq(Michael C.)
Published: (2008)
by: Gregg ,Michaelq(Michael C.)
Published: (2008)
Security for mobile networks and platforms
by: Aissi
Published: (2006)
by: Aissi
Published: (2006)
Architecturing secure software systems
by: Talukderan, Asoke K.
Published: (2009)
by: Talukderan, Asoke K.
Published: (2009)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Computer security and penetration testing
by: Basta, Alfred
Published: (2008)
by: Basta, Alfred
Published: (2008)
The software vulnerability guide
by: Thompson
Published: (2005)
by: Thompson
Published: (2005)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
SECURITY TESTING MODEL FOR DETECTING SQL INJECTION VULNERABILITY IN WEB APPLICATION /
by: Nor Fatimah Awang
by: Nor Fatimah Awang
Windows forensic analysis DVD toolkit
by: Carvey, Harlan A.
Published: (2009)
by: Carvey, Harlan A.
Published: (2009)
Introduction to information security a strategic-based approach
by: Shimeall, Timothy
Published: (2014)
by: Shimeall, Timothy
Published: (2014)
Essential cybersecurity science build, test, and evaluate secure systems
by: Dykstra, Josiah
Published: (2015)
by: Dykstra, Josiah
Published: (2015)
Security for mobility
Published: (2004)
Published: (2004)
Cybersecurity attack and defense strategies
by: Yuri, Diogenes, et al.
Published: (2019)
by: Yuri, Diogenes, et al.
Published: (2019)
Crimeware understanding new attacks and defenses
Published: (2008)
Published: (2008)
Cybersecurity managing systems,conducting testing, and investigating intrusions
by: Mowbray, Thomas J.
Published: (2014)
by: Mowbray, Thomas J.
Published: (2014)
Secure ICT service provisioning for cloud, mobile and beyond a workable architectural approach balancing between buyers and providers
by: Von Faber, Eberhard
Published: (2013)
by: Von Faber, Eberhard
Published: (2013)
Similar Items
-
Advanced penetration testing hacking the world's most secure networks
by: Allsopp, Wil
Published: (2017) -
Computer and information security handbook
Published: (2009) -
Computer and information security handbook
Published: (2013) -
Learning Kali Linux security testing, penetration testing, and ethical hacking
by: Messier, Ric
Published: (2018) -
Learn ethical hacking from scratch your stepping stone to penetration testing
by: Sabih, Zaid
Published: (2018)


