Cargando…
The mobile application hacker's handbook
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert gu...
Autores principales: | , , , |
---|---|
Lenguaje: | eng |
Publicado: |
Wiley
2015
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/2009855 |
_version_ | 1780946467252338688 |
---|---|
author | Chell, Dominic Erasmus, Tyrone Colley, Shaun Whitehouse, Ollie |
author_facet | Chell, Dominic Erasmus, Tyrone Colley, Shaun Whitehouse, Ollie |
author_sort | Chell, Dominic |
collection | CERN |
description | See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage i |
id | cern-2009855 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2015 |
publisher | Wiley |
record_format | invenio |
spelling | cern-20098552021-04-21T20:21:27Zhttp://cds.cern.ch/record/2009855engChell, DominicErasmus, TyroneColley, ShaunWhitehouse, OllieThe mobile application hacker's handbookComputing and ComputersSee your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage iWileyoai:cds.cern.ch:20098552015 |
spellingShingle | Computing and Computers Chell, Dominic Erasmus, Tyrone Colley, Shaun Whitehouse, Ollie The mobile application hacker's handbook |
title | The mobile application hacker's handbook |
title_full | The mobile application hacker's handbook |
title_fullStr | The mobile application hacker's handbook |
title_full_unstemmed | The mobile application hacker's handbook |
title_short | The mobile application hacker's handbook |
title_sort | mobile application hacker's handbook |
topic | Computing and Computers |
url | http://cds.cern.ch/record/2009855 |
work_keys_str_mv | AT chelldominic themobileapplicationhackershandbook AT erasmustyrone themobileapplicationhackershandbook AT colleyshaun themobileapplicationhackershandbook AT whitehouseollie themobileapplicationhackershandbook AT chelldominic mobileapplicationhackershandbook AT erasmustyrone mobileapplicationhackershandbook AT colleyshaun mobileapplicationhackershandbook AT whitehouseollie mobileapplicationhackershandbook |