000 | 04888cam a2200889 i 4500 | ||
---|---|---|---|
001 | ocn908032082 | ||
003 | OCoLC | ||
005 | 20240523125538.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 150427s2015 inua o 001 0 eng d | ||
040 |
_aUMI _beng _erda _epn _cUMI _dN$T _dCDX _dDEBBG _dIDEBK _dYDXCP _dDG1 _dOCLCF _dDEBSZ _dTEFOD _dCOO _dDG1 _dLIP _dOCLCQ _dOCLCO _dCEF _dDEHBZ _dCRU _dOCLCQ _dU3W _dOCLCQ _dUAB _dOCLCQ _dEYM _dOCLCO _dOCLCQ _dOCLCO _dOCLCL |
||
019 |
_a911846904 _a966385693 |
||
020 |
_a9781119183655 _q(electronic bk.) |
||
020 |
_a1119183650 _q(electronic bk.) |
||
020 |
_a9781118958520 _q(electronic bk.) |
||
020 |
_a1118958527 _q(electronic bk.) |
||
020 |
_a9781118958513 _q(electronic bk.) |
||
020 |
_a1118958519 _q(electronic bk.) |
||
020 | _z1118958500 | ||
020 | _z9781118958506 | ||
020 | _z1118958519 | ||
029 | 1 |
_aAU@ _b000056946068 |
|
029 | 1 |
_aCHNEW _b000944238 |
|
029 | 1 |
_aCHVBK _b480244707 |
|
029 | 1 |
_aDEBBG _bBV042683237 |
|
029 | 1 |
_aDEBBG _bBV043397742 |
|
029 | 1 |
_aDEBSZ _b446584428 |
|
029 | 1 |
_aDEBSZ _b453331726 |
|
029 | 1 |
_aDEBSZ _b468874844 |
|
029 | 1 |
_aGBVCP _b832465437 |
|
029 | 1 |
_aAU@ _b000073147255 |
|
035 |
_a(OCoLC)908032082 _z(OCoLC)911846904 _z(OCoLC)966385693 |
||
037 |
_aCL0500000582 _bSafari Books Online |
||
037 |
_aF1298CC5-7E83-41D4-B482-2E5E17B2CCE4 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
050 | 4 | _aQA76.59 | |
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
072 | 7 |
_aCOM _2ukslc |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aChell, Dominic, _eauthor. |
|
245 | 1 | 4 |
_aThe mobile application hacker's handbook / _cDominic Chell ... [and three others]. |
264 | 1 |
_aIndianapolis, IN : _bJohn Wiley & Sons, _c[2015] |
|
264 | 4 | _c�2015 | |
300 |
_a1 online resource (1 volume) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aPrint version record. | |
500 | _aIncludes index. | ||
505 | 0 | _aMobile application (in)security -- Analyzing IOS applications -- Attacking IOS applications -- Identifying IOS implementation insecurities -- Writing secure IOS applications -- Analyzing Android applications -- Attacking Android applications -- Identifying and exploiting Android implementation issues -- Writing secure Android applications -- Analyzing Windows Phone applications -- Attacking Windows Phone applications -- Identifying Windows Phone implementation issues -- Writing secure Windows Phone applications -- Analyzing BlackBerry applications -- Attacking BlackBerry applications -- Identifying BlackBerry application issues -- Writing secure BlackBerry applications -- Cross-platform mobile applications. | |
520 |
_aThis is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. It provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. -- _cEdited summary from book. |
||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aMobile computing. | |
650 | 0 | _aMobile apps. | |
650 | 0 | _aHacking. | |
650 | 6 | _aInformatique mobile. | |
650 | 6 | _aApplications mobiles. | |
650 | 6 | _aPiratage informatique. | |
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh |
|
650 | 7 |
_aHacking _2fast |
|
650 | 7 |
_aMobile apps _2fast |
|
650 | 7 |
_aMobile computing _2fast |
|
758 |
_ihas work: _aThe Mobile application hacker's handbook (Text) _1https://id.oclc.org/worldcat/entity/E39PCYVk4ktKKHjDTv6tX33TgX _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _aChell, Dominic. _tMobile application hacker's handbook. _dIndianapolis, IN : John Wiley & Sons, �2015 _z9781118958506 _w(OCoLC)885229394 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119183655 |
938 |
_aCoutts Information Services _bCOUT _n31853972 |
||
938 |
_aEBSCOhost _bEBSC _n1016323 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _ncis31853972 |
||
938 |
_aYBP Library Services _bYANK _n12486817 |
||
938 |
_aYBP Library Services _bYANK _n12580754 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12202 _d12202 |