Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Mobile Application Hacker's Handbook

Buy

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.

  • Understand the ways data can be stored, and how cryptography is defeated
  • Set up an environment for identifying insecurities and the data leakages that arise
  • Develop extensions to bypass security controls and perform injection attacks
  • Learn the different attacks that apply specifically to cross-platform apps

IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

(HTML tags aren't allowed.)

Network Your Computers & Devices Step by Step
Network Your Computers & Devices Step by Step

In a modern home, it is no longer unusual for family members to own multiple computers and network devices. In most houses, you can find at least a desktop computer, which is generally used for more performance-intensive tasks such as gaming or professional work of any kind. Parents bring home their work laptops or notebooks, which they...

Exploring Scanning Probe Microscopy with MATHEMATICA
Exploring Scanning Probe Microscopy with MATHEMATICA
This second edition of the book Exploring Scanning Probe Microscopy with Mathematica is a revised and extended version of the first edition. It consists of a collection of self-contained, interactive, computational examples from the fields of scanning tunneling microscopy, scanning force microscopy, and related technologies, using Mathematica...
C# Programming: From Problem Analysis to Program Design
C# Programming: From Problem Analysis to Program Design

C# Programming: From Problem Analysis to Program Design requires no previous introduction to programming and only a mathematical background of high school algebra.The book uses C# as the programming language for software development; however, the basic programming concepts presented can be applied to a number of other languages. Instead...


Analysis and design of plated structures: Volume 1:  Stability
Analysis and design of plated structures: Volume 1: Stability
Written by an international team of contributors and under the aegis of distinguished editors, Analysis and Design of Plated Structures: Volume 1: Stability reviews the wealth of research in this important area and its implications for design, safety, and maintenance. The book considers the various types of buckling that plated...
Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)
Reasoning with Logic Programming (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence)

The present book 1 provides a rigorous treatment and coherent presentation of the consolidated results of the authors' work, over the past four years, on the employment of logic programming as a representational and reasoning tool. It comes out of a background of a world-wide research effort for at least the past six years on the...

Manage Software Testing
Manage Software Testing
…a comprehensive, practical cookbook of software testing with a slight mix of quality spices. …the book is a step-by-step guide of how to perform testing. It is practically focused and, in many of the chapters, the reader can follow the tasks (as if they were recipes) when performing testing activities.
-Software Testing,
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy