|
Showing 1 - 4 of
4 matches in All Departments
Transactions Of The American Philosophical Society, V50, Part 1.
|
Hacking Exposed Mobile (Paperback, Ed)
Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray, Sarath Geethakumar, …
|
R1,481
R1,199
Discovery Miles 11 990
Save R282 (19%)
|
Ships in 10 - 15 working days
|
Publisher's Note: Products purchased from Third Party sellers are
not guaranteed by the publisher for quality, authenticity, or
access to any online entitlements included with the product.Proven
security tactics for today's mobile apps,devices, and networks"A
great overview of the new threats created by mobile devices. ...The
authors have heaps of experience in the topics and bring that to
every chapter." -- Slashdot Hacking Exposed Mobile continues in the
great tradition of the Hacking Exposed series, arming business
leaders and technology practitioners with an in-depthunderstanding
of the latest attacks and countermeasures--so they can leverage the
power of mobile platforms while ensuring that security risks are
contained." -- Jamil Farshchi, Senior Business Leader of Strategic
Planning and Initiatives, VISA Identify and evade key threats
across the expanding mobile risk landscape. Hacking Exposed Mobile:
Security Secrets & Solutions covers the wide range of attacks
to your mobile deployment alongside ready-to-use countermeasures.
Find out how attackers compromise networks and devices, attack
mobile services, and subvert mobile apps. Learn how to encrypt
mobile data, fortify mobile platforms, and eradicate malware. This
cutting-edge guide reveals secure mobile development guidelines,
how to leverage mobile OS features and MDM to isolate apps and
data, and the techniques the pros use to secure mobile payment
systems. Tour the mobile risk ecosystem with expert guides to both
attack and defense Learn how cellular network attacks compromise
devices over-the-air See the latest Android and iOS attacks in
action, and learn how to stop them Delve into mobile malware at the
code level to understand how to write resilient apps Defend against
server-side mobile attacks, including SQL and XML injection
Discover mobile web attacks, including abuse of custom URI schemes
and JavaScript bridges Develop stronger mobile authentication
routines using OAuth and SAML Get comprehensive mobile app
development security guidance covering everything from threat
modeling toiOS- and Android-specific tips Get started quickly using
our mobile pen testing and consumer security checklists
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|