Hacking exposed : mobile security secrets & solutions / Neil Bergman ... [et al.]

Colaborador(es): Bergman, Neil [coautor] | Stanfield, MIke [coautor] | Rouse, Jason [coautor] | Scambray, Joel [coautor]Tipo de material: TextoTextoDetalles de publicación: New York : McGraw-Hill, 2013 Descripción: XXVII, 289 pISBN: 9780071817011Tema(s): Seguridad informática | Datos -- Protección | Piratas informáticosResumen: Proven security tactics for today's mobile apps, devices, and networks"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- SlashdotHacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISAIdentify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.Tour the mobile risk ecosystem with expert guides to both attack and defenseLearn how cellular network attacks compromise devices over-the-airSee the latest Android and iOS attacks in action, and learn how to stop themDelve into mobile malware at the code level to understand how to write resilient appsDefend against server-side mobile attacks, including SQL and XML injectionDiscover mobile web attacks, including abuse of custom URI schemes and JavaScript bridgesDevelop stronger mobile authentication routines using OAuth and SAMLGet comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tipsGet started quickly using our mobile pen testing and consumer security checklists
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Inicie sesión para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca de origen Signatura Estado Fecha de vencimiento Código de barras Reserva de ítems Bibliografía recomendada
Manuales 03. BIBLIOTECA INGENIERÍA PUERTO REAL
681.3.07-7/HAC (Navegar estantería(Abre debajo)) Disponible   Ubicación en estantería | Bibliomaps® 3744398702

SEGURIDAD EN LOS SISTEMAS INFORMÁTICOS GRADO EN INGENIERÍA INFORMÁTICA Asignatura actualizada 2023-2024

Total de reservas: 0

Bibliografía

Proven security tactics for today's mobile apps, devices, and networks"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- SlashdotHacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISAIdentify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.Tour the mobile risk ecosystem with expert guides to both attack and defenseLearn how cellular network attacks compromise devices over-the-airSee the latest Android and iOS attacks in action, and learn how to stop themDelve into mobile malware at the code level to understand how to write resilient appsDefend against server-side mobile attacks, including SQL and XML injectionDiscover mobile web attacks, including abuse of custom URI schemes and JavaScript bridgesDevelop stronger mobile authentication routines using OAuth and SAMLGet comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tipsGet started quickly using our mobile pen testing and consumer security checklists

No hay comentarios en este titulo.

para aportar su opinión.

Con tecnología Koha