000 04073cam a2200721Ii 4500
005 20250919213642.0
006 m o d
007 cr unu||||||||
008 171212s2015 inua o 001 0 eng d
020 _a9781119183655
_qelectronic bk.
020 _a1119183650
_qelectronic bk.
020 _a9781118958520
_qelectronic bk.
020 _a1118958527
_qelectronic bk.
020 _a9781118958513
_qelectronic bk.
020 _a1118958519
_qelectronic bk.
020 _z1118958500
020 _z9781118958506
020 _z1118958519
029 1 _aDEBBG
_bBV042683237
029 1 _aDEBSZ
_b446584428
029 1 _aGBVCP
_b832465437
029 1 _aDEBSZ
_b453331726
029 1 _aDEBBG
_bBV043397742
035 _a(OCoLC)908032082
_z(OCoLC)911846904
_z(OCoLC)966385693
035 _a(OCoLC)ocn908032082
037 _aCL0500000582
_bSafari Books Online
037 _aF1298CC5-7E83-41D4-B482-2E5E17B2CCE4
_bOverDrive, Inc.
_nhttp://www.overdrive.com
039 9 _a201902121250
_bemilda
_y12-12-2017
_zhafiz
_wMYUKM (1).mrc
_x692
040 _aUMI
_beng
_erda
_epn
_cUMI
_dNST
_dCDX
_dDEBBG
_dIDEBK
_dYDXCP
_dDG1
_dOCLCF
_dDEBSZ
_dTEFOD
_dCOO
049 _aMAIN
050 4 _aQA76.59
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
072 7 _aCOM
_2ukslc
082 0 4 _a005.8
_223
100 1 _aChell, Dominic,
_eauthor.
245 1 4 _aThe mobile application hacker's handbook /
_cDominic Chell ... [and three others].
264 1 _aIndianapolis, IN :
_bJohn Wiley & Sons,
_c[2015]
264 4 _c©2015
300 _a1 online resource (1 volume) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
505 0 _aMobile application (in)security -- Analyzing IOS applications -- Attacking IOS applications -- Identifying IOS implementation insecurities -- Writing secure IOS applications -- Analyzing Android applications -- Attacking Android applications -- Identifying and exploiting Android implementation issues -- Writing secure Android applications -- Analyzing Windows Phone applications -- Attacking Windows Phone applications -- Identifying Windows Phone implementation issues -- Writing secure Windows Phone applications -- Analyzing BlackBerry applications -- Attacking BlackBerry applications -- Identifying BlackBerry application issues -- Writing secure BlackBerry applications -- Cross-platform mobile applications.
520 _aThis is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. --
_cEdited summary from book.
588 _aDescription based on print version record.
650 0 _aMobile computing.
650 0 _aMobile apps.
650 0 _aHacking.
655 4 _aElectronic books.
655 0 _aElectronic books.
773 0 _tWiley e-books
776 0 8 _iPrint version:
_aChell, Dominic.
_tMobile application hacker's handbook.
_dIndianapolis, IN : John Wiley & Sons, c2015
_z9781118958506
_w(OCoLC)885229394
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781119183655
_zWiley Online Library
907 _a.b16544298
_b2022-10-23
_c2019-11-12
942 _n0
914 _avtls003629362
998 _ae
_b2017-12-12
_cm
_dz
_feng
_ginu
_y0
_z.b16544298
999 _c691373
_d691373