๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Hacking exposed: mobile security secrets & solutions

โœ Scribed by Scambray, Joel;Rouse, Jason;Stanfield, Mike;Bergman, Neil


Publisher
McGraw-Hill
Year
2013
Tongue
English
Leaves
320
Series
Secure beginner's guides
Edition
1st edition
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit.;"Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"--;"Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"--

โœฆ Table of Contents


The Mobile Risk Ecosystem --
Hacking the Cellular Network --
iOS --
Android --
Mobile Malware --
Mobile Services and Mobile Web --
Mobile Device Management --
Mobile Development Security --
Mobile Payments --
Consumer Security Checklist --
Security Checklist --
Mobile Application Penetration Testing Toolkit --
iOS Pen Test Toolkit --
Android Pen Test Toolkit.

โœฆ Subjects


COMPUTERS--Networking--Security;Electrical & Computer Engineering;Engineering & Applied Sciences;Mobile communication systems--Security measures;Mobile computing--Security measures;Telecommunications;Computer crimes--Prevention;Computer networks--Security measures;Hackers;Electronic books;Computer networks -- Security measures;Mobile computing -- Security measures;Mobile communication systems -- Security measures;Computer crimes -- Prevention;COMPUTERS -- Networking -- Security


๐Ÿ“œ SIMILAR VOLUMES


Hacking Exposed Mobile Security Secrets
โœ Joel Scambray, Neil Bergman, Mike Stanfield, Jason Rouse ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› McGraw-Hill ๐ŸŒ English

Proven security tactics for todays mobile apps, devices, and networks.<br>ยซA great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter.ยป Slashdot.<br>Hacking Exposed Mobile continues in the great tradition of th

Hacking Exposed Mobile: Security Secrets
โœ Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Sw ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› McGraw-Hill ๐ŸŒ English

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures - so they can leverage the power of mobile platforms while ensuring that security risks

Hacking Exposed: Network Security Secret
โœ Stuart McClure, Joel Scambray, George Kurtz ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Osborne/McGraw-Hill ๐ŸŒ English

The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET

Hacking Exposed: Network Security Secret
โœ Jean Letessier, Johann Rafelski ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐Ÿ› Osborne/McGraw-Hill ๐ŸŒ English

The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET