Hacking exposed mobile security secrets & solutions

"Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack...

Full description

Bibliographic Details
Main Author: Bergman, Neil
Other Authors: Stanfield, Mike, Rouse, Jason, Scambray, Joel
Format: eBook
Language:English
Published: New York McGraw-Hill 2013
Series:The secure beginner's guides: security smarts for the self-guided IT professional
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 04203nmm a2200613 u 4500
001 EB001923202
003 EBX01000000000000001086104
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781299826359 
020 |a 9780071817028 
020 |a 1299826350 
020 |a 0071817026 
050 4 |a TK5105.59 
100 1 |a Bergman, Neil 
245 0 0 |a Hacking exposed  |b mobile security secrets & solutions  |c Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray 
260 |a New York  |b McGraw-Hill  |c 2013 
300 |a xxvii, 289 pages  |b illustrations 
505 0 |a Includes bibliographical references and index 
505 0 |a The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit 
653 |a Mobile computing / Security measures 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Hackers / fast 
653 |a Réseaux d'ordinateurs / Sécurité / Mesures 
653 |a Computer crimes / Prevention / fast 
653 |a Pirates informatiques 
653 |a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277 
653 |a Computer networks / Security measures / fast 
653 |a Informatique mobile / Sécurité / Mesures 
653 |a Hackers / http://id.loc.gov/authorities/subjects/sh94005931 
653 |a Radiocommunications mobiles / Sécurité / Mesures 
653 |a Computer crimes / Prevention 
653 |a Mobile communication systems / Security measures 
700 1 |a Stanfield, Mike 
700 1 |a Rouse, Jason 
700 1 |a Scambray, Joel 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a The secure beginner's guides: security smarts for the self-guided IT professional 
500 |a Includes index 
776 |z 1299826350 
776 |z 0071817026 
776 |z 0071817018 
776 |z 9780071817028 
776 |z 9780071817011 
776 |z 9781299826359 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780071817011/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 331 
082 0 |a 005.8 
082 0 |a 364.1 
520 |a "Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"-- 
520 |a "Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"--