Hacking Exposed Mobile: Security Secrets & Solutions
โ Scribed by Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price
- Publisher
- McGraw-Hill
- Year
- 2013
- Tongue
- English
- Leaves
- 320
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks are contained. Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.
๐ SIMILAR VOLUMES
The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing
Proven security tactics for todays mobile apps, devices, and networks.<br>ยซA great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter.ยป Slashdot.<br>Hacking Exposed Mobile continues in the great tradition of th
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET