Hacking exposed: mobile security secrets & solutions
"Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. T...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York
McGraw-Hill
[2013]
|
Schriftenreihe: | The secure beginner's guides: security smarts for the self-guided IT professional
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780071817011/?ar |
Zusammenfassung: | "Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"-- "Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"-- |
Beschreibung: | Includes index. - Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxvii, 289 Seiten) illustrations |
ISBN: | 1299826350 9781299826359 9780071817028 0071817026 9780071817011 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-04739482X | ||
003 | DE-627-1 | ||
005 | 20240228115415.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 1299826350 |c electronic bk. |9 1-299-82635-0 | ||
020 | |a 9781299826359 |c electronic bk. |9 978-1-299-82635-9 | ||
020 | |a 9780071817028 |c electronic bk. |9 978-0-07-181702-8 | ||
020 | |a 0071817026 |c electronic bk. |9 0-07-181702-6 | ||
020 | |a 9780071817011 |9 978-0-07-181701-1 | ||
035 | |a (DE-627-1)04739482X | ||
035 | |a (DE-599)KEP04739482X | ||
035 | |a (ORHE)9780071817011 | ||
035 | |a (DE-627-1)04739482X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Bergman, Neil |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hacking exposed |b mobile security secrets & solutions |c Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray |
264 | 1 | |a New York |b McGraw-Hill |c [2013] | |
300 | |a 1 Online-Ressource (xxvii, 289 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a The secure beginner's guides: security smarts for the self-guided IT professional | |
500 | |a Includes index. - Includes bibliographical references and index. - Print version record | ||
520 | |a "Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"-- | ||
520 | |a "Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"-- | ||
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Mobile computing |x Security measures | |
650 | 0 | |a Mobile communication systems |x Security measures | |
650 | 0 | |a Hackers | |
650 | 0 | |a Computer crimes |x Prevention | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Informatique mobile ; Sécurité ; Mesures | |
650 | 4 | |a Radiocommunications mobiles ; Sécurité ; Mesures | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a Computer crimes ; Prevention | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Hackers | |
700 | 1 | |a Stanfield, Mike |e MitwirkendeR |4 ctb | |
700 | 1 | |a Rouse, Jason |e MitwirkendeR |4 ctb | |
700 | 1 | |a Scambray, Joel |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9780071817011 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780071817011 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780071817011/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-04739482X |
---|---|
_version_ | 1821494911959040000 |
adam_text | |
any_adam_object | |
author | Bergman, Neil |
author2 | Stanfield, Mike Rouse, Jason Scambray, Joel |
author2_role | ctb ctb ctb |
author2_variant | m s ms j r jr j s js |
author_facet | Bergman, Neil Stanfield, Mike Rouse, Jason Scambray, Joel |
author_role | aut |
author_sort | Bergman, Neil |
author_variant | n b nb |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)04739482X (DE-599)KEP04739482X (ORHE)9780071817011 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04160cam a22006252 4500</leader><controlfield tag="001">ZDB-30-ORH-04739482X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115415.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299826350</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-299-82635-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299826359</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-299-82635-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071817028</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-07-181702-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0071817026</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-07-181702-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780071817011</subfield><subfield code="9">978-0-07-181701-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04739482X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP04739482X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780071817011</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)04739482X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bergman, Neil</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking exposed</subfield><subfield code="b">mobile security secrets & solutions</subfield><subfield code="c">Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">McGraw-Hill</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvii, 289 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">The secure beginner's guides: security smarts for the self-guided IT professional</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index. - Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"--</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique mobile ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Radiocommunications mobiles ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Stanfield, Mike</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rouse, Jason</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scambray, Joel</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780071817011</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780071817011</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780071817011/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-04739482X |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:54Z |
institution | BVB |
isbn | 1299826350 9781299826359 9780071817028 0071817026 9780071817011 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxvii, 289 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | McGraw-Hill |
record_format | marc |
series2 | The secure beginner's guides: security smarts for the self-guided IT professional |
spelling | Bergman, Neil VerfasserIn aut Hacking exposed mobile security secrets & solutions Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray New York McGraw-Hill [2013] 1 Online-Ressource (xxvii, 289 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier The secure beginner's guides: security smarts for the self-guided IT professional Includes index. - Includes bibliographical references and index. - Print version record "Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"-- "Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"-- Computer networks Security measures Mobile computing Security measures Mobile communication systems Security measures Hackers Computer crimes Prevention Réseaux d'ordinateurs ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Radiocommunications mobiles ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Networking ; Security Computer crimes ; Prevention Computer networks ; Security measures Stanfield, Mike MitwirkendeR ctb Rouse, Jason MitwirkendeR ctb Scambray, Joel MitwirkendeR ctb 9780071817011 Erscheint auch als Druck-Ausgabe 9780071817011 |
spellingShingle | Bergman, Neil Hacking exposed mobile security secrets & solutions Computer networks Security measures Mobile computing Security measures Mobile communication systems Security measures Hackers Computer crimes Prevention Réseaux d'ordinateurs ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Radiocommunications mobiles ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Networking ; Security Computer crimes ; Prevention Computer networks ; Security measures |
title | Hacking exposed mobile security secrets & solutions |
title_auth | Hacking exposed mobile security secrets & solutions |
title_exact_search | Hacking exposed mobile security secrets & solutions |
title_full | Hacking exposed mobile security secrets & solutions Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray |
title_fullStr | Hacking exposed mobile security secrets & solutions Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray |
title_full_unstemmed | Hacking exposed mobile security secrets & solutions Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray |
title_short | Hacking exposed |
title_sort | hacking exposed mobile security secrets solutions |
title_sub | mobile security secrets & solutions |
topic | Computer networks Security measures Mobile computing Security measures Mobile communication systems Security measures Hackers Computer crimes Prevention Réseaux d'ordinateurs ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Radiocommunications mobiles ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Networking ; Security Computer crimes ; Prevention Computer networks ; Security measures |
topic_facet | Computer networks Security measures Mobile computing Security measures Mobile communication systems Security measures Hackers Computer crimes Prevention Réseaux d'ordinateurs ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Radiocommunications mobiles ; Sécurité ; Mesures Pirates informatiques COMPUTERS ; Networking ; Security Computer crimes ; Prevention Computer networks ; Security measures |
work_keys_str_mv | AT bergmanneil hackingexposedmobilesecuritysecretssolutions AT stanfieldmike hackingexposedmobilesecuritysecretssolutions AT rousejason hackingexposedmobilesecuritysecretssolutions AT scambrayjoel hackingexposedmobilesecuritysecretssolutions |