| 000 | 04073cam a2200721Ii 4500 | ||
|---|---|---|---|
| 005 | 20250919213642.0 | ||
| 006 | m o d | ||
| 007 | cr unu|||||||| | ||
| 008 | 171212s2015 inua o 001 0 eng d | ||
| 020 |
_a9781119183655 _qelectronic bk. |
||
| 020 |
_a1119183650 _qelectronic bk. |
||
| 020 |
_a9781118958520 _qelectronic bk. |
||
| 020 |
_a1118958527 _qelectronic bk. |
||
| 020 |
_a9781118958513 _qelectronic bk. |
||
| 020 |
_a1118958519 _qelectronic bk. |
||
| 020 | _z1118958500 | ||
| 020 | _z9781118958506 | ||
| 020 | _z1118958519 | ||
| 029 | 1 |
_aDEBBG _bBV042683237 |
|
| 029 | 1 |
_aDEBSZ _b446584428 |
|
| 029 | 1 |
_aGBVCP _b832465437 |
|
| 029 | 1 |
_aDEBSZ _b453331726 |
|
| 029 | 1 |
_aDEBBG _bBV043397742 |
|
| 035 |
_a(OCoLC)908032082 _z(OCoLC)911846904 _z(OCoLC)966385693 |
||
| 035 | _a(OCoLC)ocn908032082 | ||
| 037 |
_aCL0500000582 _bSafari Books Online |
||
| 037 |
_aF1298CC5-7E83-41D4-B482-2E5E17B2CCE4 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 039 | 9 |
_a201902121250 _bemilda _y12-12-2017 _zhafiz _wMYUKM (1).mrc _x692 |
|
| 040 |
_aUMI _beng _erda _epn _cUMI _dNST _dCDX _dDEBBG _dIDEBK _dYDXCP _dDG1 _dOCLCF _dDEBSZ _dTEFOD _dCOO |
||
| 049 | _aMAIN | ||
| 050 | 4 | _aQA76.59 | |
| 072 | 7 |
_aCOM _x060040 _2bisacsh |
|
| 072 | 7 |
_aCOM _x043050 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 072 | 7 |
_aCOM _2ukslc |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aChell, Dominic, _eauthor. |
|
| 245 | 1 | 4 |
_aThe mobile application hacker's handbook / _cDominic Chell ... [and three others]. |
| 264 | 1 |
_aIndianapolis, IN : _bJohn Wiley & Sons, _c[2015] |
|
| 264 | 4 | _c©2015 | |
| 300 |
_a1 online resource (1 volume) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aMobile application (in)security -- Analyzing IOS applications -- Attacking IOS applications -- Identifying IOS implementation insecurities -- Writing secure IOS applications -- Analyzing Android applications -- Attacking Android applications -- Identifying and exploiting Android implementation issues -- Writing secure Android applications -- Analyzing Windows Phone applications -- Attacking Windows Phone applications -- Identifying Windows Phone implementation issues -- Writing secure Windows Phone applications -- Analyzing BlackBerry applications -- Attacking BlackBerry applications -- Identifying BlackBerry application issues -- Writing secure BlackBerry applications -- Cross-platform mobile applications. | |
| 520 |
_aThis is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. -- _cEdited summary from book. |
||
| 588 | _aDescription based on print version record. | ||
| 650 | 0 | _aMobile computing. | |
| 650 | 0 | _aMobile apps. | |
| 650 | 0 | _aHacking. | |
| 655 | 4 | _aElectronic books. | |
| 655 | 0 | _aElectronic books. | |
| 773 | 0 | _tWiley e-books | |
| 776 | 0 | 8 |
_iPrint version: _aChell, Dominic. _tMobile application hacker's handbook. _dIndianapolis, IN : John Wiley & Sons, c2015 _z9781118958506 _w(OCoLC)885229394 |
| 856 | 4 | 0 |
_uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://onlinelibrary.wiley.com/book/10.1002/9781119183655 _zWiley Online Library |
| 907 |
_a.b16544298 _b2022-10-23 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003629362 | ||
| 998 |
_ae _b2017-12-12 _cm _dz _feng _ginu _y0 _z.b16544298 |
||
| 999 |
_c691373 _d691373 |
||