Cargando…

The mobile application hacker's handbook

See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert gu...

Descripción completa

Detalles Bibliográficos
Autores principales: Chell, Dominic, Erasmus, Tyrone, Colley, Shaun, Whitehouse, Ollie
Lenguaje:eng
Publicado: Wiley 2015
Materias:
Acceso en línea:http://cds.cern.ch/record/2009855
_version_ 1780946467252338688
author Chell, Dominic
Erasmus, Tyrone
Colley, Shaun
Whitehouse, Ollie
author_facet Chell, Dominic
Erasmus, Tyrone
Colley, Shaun
Whitehouse, Ollie
author_sort Chell, Dominic
collection CERN
description See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage i
id cern-2009855
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2015
publisher Wiley
record_format invenio
spelling cern-20098552021-04-21T20:21:27Zhttp://cds.cern.ch/record/2009855engChell, DominicErasmus, TyroneColley, ShaunWhitehouse, OllieThe mobile application hacker's handbookComputing and ComputersSee your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage iWileyoai:cds.cern.ch:20098552015
spellingShingle Computing and Computers
Chell, Dominic
Erasmus, Tyrone
Colley, Shaun
Whitehouse, Ollie
The mobile application hacker's handbook
title The mobile application hacker's handbook
title_full The mobile application hacker's handbook
title_fullStr The mobile application hacker's handbook
title_full_unstemmed The mobile application hacker's handbook
title_short The mobile application hacker's handbook
title_sort mobile application hacker's handbook
topic Computing and Computers
url http://cds.cern.ch/record/2009855
work_keys_str_mv AT chelldominic themobileapplicationhackershandbook
AT erasmustyrone themobileapplicationhackershandbook
AT colleyshaun themobileapplicationhackershandbook
AT whitehouseollie themobileapplicationhackershandbook
AT chelldominic mobileapplicationhackershandbook
AT erasmustyrone mobileapplicationhackershandbook
AT colleyshaun mobileapplicationhackershandbook
AT whitehouseollie mobileapplicationhackershandbook