Hacking exposed : mobile security secrets & solutions
(Book)

Book Cover
Average Rating
Status
General Shelving - 3rd Floor
TK5105.59 .B464 2013
1 available

Description

Loading Description...

Also in this Series

Checking series information...

Copies

LocationCall NumberStatus
General Shelving - 3rd FloorTK5105.59 .B464 2013On Shelf

More Like This

Loading more titles like this title...

More Details

Format
Book
Physical Desc
xxvii, 289 pages ; 24 cm
Language
English

Notes

Description
"Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"--,Provided by publisher.
Description
"Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"--,Provided by publisher.
Local note
SACFinal081324

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Bergman, N., Stanfield, M., Rouse, J., & Scambray, J. (2013). Hacking exposed: mobile security secrets & solutions . McGraw-Hill.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Neil. Bergman et al.. 2013. Hacking Exposed: Mobile Security Secrets & Solutions. New York: McGraw-Hill.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Neil. Bergman et al.. Hacking Exposed: Mobile Security Secrets & Solutions New York: McGraw-Hill, 2013.

Harvard Citation (style guide)

Bergman, N., Stanfield, M., Rouse, J. and Scambray, J. (2013). Hacking exposed: mobile security secrets & solutions. New York: McGraw-Hill.

MLA Citation, 9th Edition (style guide)

Bergman, Neil., Mike Stanfield, Jason Rouse, and Joel Scambray. Hacking Exposed: Mobile Security Secrets & Solutions McGraw-Hill, 2013.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Loading Staff View.