000 04428cam a2200793Ii 4500
001 sulb-eb0033847
003 BD-SySUS
005 20170713221420.0
006 m o d
007 cr unu||||||||
008 150427s2015 inua o 001 0 eng d
040 _aUMI
_beng
_erda
_epn
_cUMI
_dN$T
_dCDX
_dDEBBG
_dIDEBK
_dYDXCP
_dDG1
_dOCLCF
_dDEBSZ
_dTEFOD
_dCOO
_dBD-SySUS
019 _a911846904
_a966385693
020 _a9781119183655
_qelectronic bk.
020 _a1119183650
_qelectronic bk.
020 _a9781118958520
_qelectronic bk.
020 _a1118958527
_qelectronic bk.
020 _a9781118958513
_qelectronic bk.
020 _a1118958519
_qelectronic bk.
020 _z1118958500
020 _z9781118958506
020 _z1118958519
029 1 _aDEBBG
_bBV042683237
029 1 _aDEBSZ
_b446584428
029 1 _aGBVCP
_b832465437
029 1 _aDEBSZ
_b453331726
029 1 _aDEBBG
_bBV043397742
035 _a(OCoLC)908032082
_z(OCoLC)911846904
_z(OCoLC)966385693
037 _aCL0500000582
_bSafari Books Online
037 _aF1298CC5-7E83-41D4-B482-2E5E17B2CCE4
_bOverDrive, Inc.
_nhttp://www.overdrive.com
050 4 _aQA76.59
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aCOM
_2ukslc
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aChell, Dominic,
_eauthor.
245 1 4 _aThe mobile application hacker's handbook /
_cDominic Chell ... [and three others].
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons,
_c[2015]
264 4 _c©2015
300 _a1 online resource (1 volume) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 _aDescription based on print version record.
500 _aIncludes index.
505 0 _aMobile application (in)security -- Analyzing IOS applications -- Attacking IOS applications -- Identifying IOS implementation insecurities -- Writing secure IOS applications -- Analyzing Android applications -- Attacking Android applications -- Identifying and exploiting Android implementation issues -- Writing secure Android applications -- Analyzing Windows Phone applications -- Attacking Windows Phone applications -- Identifying Windows Phone implementation issues -- Writing secure Windows Phone applications -- Analyzing BlackBerry applications -- Attacking BlackBerry applications -- Identifying BlackBerry application issues -- Writing secure BlackBerry applications -- Cross-platform mobile applications.
520 _aThis is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. --
_cEdited summary from book.
650 7 _aCOMPUTERS
_xInternet
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xNetworking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 0 _aMobile computing.
650 0 _aMobile apps.
650 0 _aHacking.
650 7 _aHacking.
_2fast
_0(OCoLC)fst01909643
650 7 _aMobile apps.
_2fast
_0(OCoLC)fst01909896
650 7 _aMobile computing.
_2fast
_0(OCoLC)fst01024221
655 4 _aElectronic books.
655 0 _aElectronic books.
776 0 8 _iPrint version:
_aChell, Dominic.
_tMobile application hacker's handbook.
_dIndianapolis, IN : John Wiley & Sons, c2015
_z9781118958506
_w(OCoLC)885229394
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183655
_zWiley Online Library [Free Download only for SUST IP]
938 _aEBSCOhost
_bEBSC
_n1016323
938 _aCoutts Information Services
_bCOUT
_n31853972
938 _aIngram Digital eBook Collection
_bIDEB
_ncis31853972
938 _aYBP Library Services
_bYANK
_n12486817
938 _aYBP Library Services
_bYANK
_n12580754
994 _a92
_bDG1
999 _c65499
_d65499