Cargando…

Mobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter them

Detalles Bibliográficos
Autor principal: Velu, Vijay Kumar
Lenguaje:eng
Publicado: Packt Publ. 2016
Materias:
Acceso en línea:http://cds.cern.ch/record/2152908
_version_ 1780950563389702144
author Velu, Vijay Kumar
author_facet Velu, Vijay Kumar
author_sort Velu, Vijay Kumar
collection CERN
id cern-2152908
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2016
publisher Packt Publ.
record_format invenio
spelling cern-21529082021-04-21T19:41:59Zhttp://cds.cern.ch/record/2152908engVelu, Vijay KumarMobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter themComputing and ComputersPackt Publ.oai:cds.cern.ch:21529082016
spellingShingle Computing and Computers
Velu, Vijay Kumar
Mobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
title Mobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
title_full Mobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
title_fullStr Mobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
title_full_unstemmed Mobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
title_short Mobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
title_sort mobile application penetration testing: explore real-world threat scenarios, attacks on mobile applications, and ways to counter them
topic Computing and Computers
url http://cds.cern.ch/record/2152908
work_keys_str_mv AT veluvijaykumar mobileapplicationpenetrationtestingexplorerealworldthreatscenariosattacksonmobileapplicationsandwaystocounterthem