Welcome to Central Library, SUST

The mobile application hacker's handbook / (Record no. 65499)

MARC details
000 -LEADER
fixed length control field 04428cam a2200793Ii 4500
001 - CONTROL NUMBER
control field sulb-eb0033847
003 - CONTROL NUMBER IDENTIFIER
control field BD-SySUS
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20170713221420.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr unu||||||||
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150427s2015 inua o 001 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency UMI
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency UMI
Modifying agency N$T
-- CDX
-- DEBBG
-- IDEBK
-- YDXCP
-- DG1
-- OCLCF
-- DEBSZ
-- TEFOD
-- COO
-- BD-SySUS
019 ## -
-- 911846904
-- 966385693
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119183655
Qualifying information electronic bk.
International Standard Book Number 1119183650
Qualifying information electronic bk.
International Standard Book Number 9781118958520
Qualifying information electronic bk.
International Standard Book Number 1118958527
Qualifying information electronic bk.
International Standard Book Number 9781118958513
Qualifying information electronic bk.
International Standard Book Number 1118958519
Qualifying information electronic bk.
Canceled/invalid ISBN 1118958500
Canceled/invalid ISBN 9781118958506
Canceled/invalid ISBN 1118958519
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV042683237
OCLC library identifier DEBSZ
System control number 446584428
OCLC library identifier GBVCP
System control number 832465437
OCLC library identifier DEBSZ
System control number 453331726
OCLC library identifier DEBBG
System control number BV043397742
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)908032082
Canceled/invalid control number (OCoLC)911846904
-- (OCoLC)966385693
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000582
Source of stock number/acquisition Safari Books Online
Stock number F1298CC5-7E83-41D4-B482-2E5E17B2CCE4
Source of stock number/acquisition OverDrive, Inc.
Note http://www.overdrive.com
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.59
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 060040
Source bisacsh
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
Subject category code COM
Source ukslc
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Chell, Dominic,
Relator term author.
245 14 - TITLE STATEMENT
Title The mobile application hacker's handbook /
Statement of responsibility, etc. Dominic Chell ... [and three others].
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
Date of production, publication, distribution, manufacture, or copyright notice ©2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (1 volume) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Description based on print version record.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Mobile application (in)security -- Analyzing IOS applications -- Attacking IOS applications -- Identifying IOS implementation insecurities -- Writing secure IOS applications -- Analyzing Android applications -- Attacking Android applications -- Identifying and exploiting Android implementation issues -- Writing secure Android applications -- Analyzing Windows Phone applications -- Attacking Windows Phone applications -- Identifying Windows Phone implementation issues -- Writing secure Windows Phone applications -- Analyzing BlackBerry applications -- Attacking BlackBerry applications -- Identifying BlackBerry application issues -- Writing secure BlackBerry applications -- Cross-platform mobile applications.
520 ## - SUMMARY, ETC.
Summary, etc. This is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. --
Assigning source Edited summary from book.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Internet
-- Security.
Source of heading or term bisacsh
Topical term or geographic name as entry element COMPUTERS
General subdivision Networking
-- Security.
Source of heading or term bisacsh
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- General.
Source of heading or term bisacsh
Topical term or geographic name as entry element Mobile computing.
Topical term or geographic name as entry element Mobile apps.
Topical term or geographic name as entry element Hacking.
Topical term or geographic name as entry element Hacking.
Source of heading or term fast
Authority record control number (OCoLC)fst01909643
Topical term or geographic name as entry element Mobile apps.
Source of heading or term fast
Authority record control number (OCoLC)fst01909896
Topical term or geographic name as entry element Mobile computing.
Source of heading or term fast
Authority record control number (OCoLC)fst01024221
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Chell, Dominic.
Title Mobile application hacker's handbook.
Place, publisher, and date of publication Indianapolis, IN : John Wiley & Sons, c2015
International Standard Book Number 9781118958506
Record control number (OCoLC)885229394
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://onlinelibrary.wiley.com/book/10.1002/9781119183655">http://onlinelibrary.wiley.com/book/10.1002/9781119183655</a>
Public note Wiley Online Library [Free Download only for SUST IP]
938 ## -
-- EBSCOhost
-- EBSC
-- 1016323
-- Coutts Information Services
-- COUT
-- 31853972
-- Ingram Digital eBook Collection
-- IDEB
-- cis31853972
-- YBP Library Services
-- YANK
-- 12486817
-- YBP Library Services
-- YANK
-- 12580754
994 ## -
-- 92
-- DG1

No items available.