|
|
|
|
LEADER |
04068nam a2200721 4500 |
001 |
ocn908032082 |
003 |
OCoLC |
005 |
20170124070010.5 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
150427s2015 inua o 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d N$T
|d CDX
|d DEBBG
|d IDEBK
|d YDXCP
|d DG1
|d OCLCF
|d DEBSZ
|d TEFOD
|d COO
|d GrThAP
|
019 |
|
|
|a 911846904
|a 966385693
|
020 |
|
|
|a 9781119183655
|q electronic bk.
|
020 |
|
|
|a 1119183650
|q electronic bk.
|
020 |
|
|
|a 9781118958520
|q electronic bk.
|
020 |
|
|
|a 1118958527
|q electronic bk.
|
020 |
|
|
|a 9781118958513
|q electronic bk.
|
020 |
|
|
|a 1118958519
|q electronic bk.
|
020 |
|
|
|z 1118958500
|
020 |
|
|
|z 9781118958506
|
020 |
|
|
|z 1118958519
|
029 |
1 |
|
|a DEBBG
|b BV042683237
|
029 |
1 |
|
|a DEBSZ
|b 446584428
|
029 |
1 |
|
|a GBVCP
|b 832465437
|
029 |
1 |
|
|a DEBSZ
|b 453331726
|
029 |
1 |
|
|a DEBBG
|b BV043397742
|
035 |
|
|
|a (OCoLC)908032082
|z (OCoLC)911846904
|z (OCoLC)966385693
|
037 |
|
|
|a CL0500000582
|b Safari Books Online
|
037 |
|
|
|a F1298CC5-7E83-41D4-B482-2E5E17B2CCE4
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.59
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|2 ukslc
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Chell, Dominic,
|e author.
|
245 |
1 |
4 |
|a The mobile application hacker's handbook /
|c Dominic Chell ... [and three others].
|
264 |
|
1 |
|a Indianapolis, IN :
|b John Wiley & Sons,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
|
|
|a Description based on print version record.
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Mobile application (in)security -- Analyzing IOS applications -- Attacking IOS applications -- Identifying IOS implementation insecurities -- Writing secure IOS applications -- Analyzing Android applications -- Attacking Android applications -- Identifying and exploiting Android implementation issues -- Writing secure Android applications -- Analyzing Windows Phone applications -- Attacking Windows Phone applications -- Identifying Windows Phone implementation issues -- Writing secure Windows Phone applications -- Analyzing BlackBerry applications -- Attacking BlackBerry applications -- Identifying BlackBerry application issues -- Writing secure BlackBerry applications -- Cross-platform mobile applications.
|
520 |
|
|
|a This is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. --
|c Edited summary from book.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
0 |
|a Mobile computing.
|
650 |
|
0 |
|a Mobile apps.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Mobile apps.
|2 fast
|0 (OCoLC)fst01909896
|
650 |
|
7 |
|a Mobile computing.
|2 fast
|0 (OCoLC)fst01024221
|
655 |
|
4 |
|a Electronic books.
|
655 |
|
0 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Chell, Dominic.
|t Mobile application hacker's handbook.
|d Indianapolis, IN : John Wiley & Sons, c2015
|z 9781118958506
|w (OCoLC)885229394
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781119183655
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|