Search Books
Tableau 8: The Official Gui… Complete Audio Mastering: P…

Hacking Exposed Mobile: Security Secrets & Solutions

Author Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, Swapnil Deshmukh, Scott Matsumoto, John Steven, Mike Price
Publisher McGraw-Hill Education
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
29.98 50.00 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $6.27

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN0071817018
ISBN-139780071817011
AvailabilityUsually ships in 24 hours
Sales Rank1,206,000
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depthunderstanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA

Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.

  • Tour the mobile risk ecosystem with expert guides to both attack and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using OAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling toiOS- and Android-specific tips
  • Get started quickly using our mobile pen testing and consumer security checklists

  • Similar Products

    Sams Teach Yourself Android Application Development in…
    View
    Applied Data Communications: A Business-Oriented Appro…
    View
    OSPF: Anatomy of an Internet Routing Protocol
    View
    Web Scalability for Startup Engineers
    View
    Industrial Electronics
    View
    MAPLE: A Comprehensive Introduction
    View
    Guide to the Software Engineering Body of Knowledge (S…
    View
    Mastering VBA for Microsoft Office 2013
    View