undrgrnd Cliquez ici NEWNEEEW nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici Rentrée scolaire Cliquez ici Acheter Fire Shop Kindle Paperwhite cliquez_ici Jeux Vidéo Bijoux Montres Montres boutique Tendance

Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

Hacking Exposed Mobile: Security Secrets & Solutions [Format Kindle]

Neil Bergman , Mike Stanfield , Jason Rouse , Joel Scambray , Sarath Geethakumar , Swapnil Deshmukh , Scott Matsumoto , John Steven , Mike Price

Prix Kindle : EUR 26,34 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet

  • Langue : Anglais
  • En raison de la taille importante du fichier, ce livre peut prendre plus de temps à télécharger
  • Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.
App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 26,34  
Broché --  

Les clients ayant acheté cet article ont également acheté

Cette fonction d'achat continuera à charger les articles. Pour naviguer hors de ce carrousel, veuillez utiliser votre touche de raccourci d'en-tête pour naviguer vers l'en-tête précédente ou suivante.

Descriptions du produit

Présentation de l'éditeur

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA

Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.

  • Tour the mobile risk ecosystem with expert guides to both attack and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using OAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips
  • Get started quickly using our mobile pen testing and consumer security checklists
  • Biographie de l'auteur

    Neil Bergman is a senior security consultant at Cigital, a leading software security firm, where he conducts and leads penetration testing, code review, and threat modeling of software on behalf of major organizations.

    Mike Stanfield is a security consultant at Cigital where he specializes in security assessments for the iOS, Android, and Blackberry platforms.

    Jason Rouse is a security architect on the team responsible for the security of Bloomberg LP’s products and services.

    Joel Scambray, CISSP, is a managing principal at Cigital and the bestselling coauthor of seven editions of Hacking Exposed.

    Détails sur le produit

    • Format : Format Kindle
    • Taille du fichier : 54619 KB
    • Nombre de pages de l'édition imprimée : 320 pages
    • Editeur : McGraw-Hill Education; Édition : 1 (5 août 2013)
    • Vendu par : Amazon Media EU S.à r.l.
    • Langue : Anglais
    • Synthèse vocale : Activée
    • X-Ray :
    • Word Wise: Non activé
    • Composition améliorée: Activé
    • Classement des meilleures ventes d'Amazon: n°237.515 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
    •  Souhaitez-vous faire modifier les images ?

    En savoir plus sur les auteurs

    Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

    Commentaires en ligne

    Il n'y a pas encore de commentaires clients sur Amazon.fr
    5 étoiles
    4 étoiles
    3 étoiles
    2 étoiles
    1 étoiles
    Commentaires client les plus utiles sur Amazon.com (beta)
    Amazon.com: 4.2 étoiles sur 5  13 commentaires
    14 internautes sur 17 ont trouvé ce commentaire utile 
    3.0 étoiles sur 5 Good & Bad 14 août 2013
    Par Amazon Customer - Publié sur Amazon.com
    Format:Format Kindle|Achat vérifié
    Being a security professional, and being a mobile developer (and advocate) I find that the book is largely a regurgitation of online content - in a rather long, drawn out process. I have read several other "Hacking Exposed" books and have found them well presented and with good coverage and knowledge transfer. I don't find this one at the same level. Mediocre coverage (for instance could have gotten into the cellular telephony aspects deeper), and mediocre knowledge transfer.

    If you know nothing about mobile or mobile security, this might be a kick-ass book for you. If you know something, it is a snoozer trying to get to anything novel - which you don't.

    I am also disappointed that unlike previous Hacking Exposed books, this one does not take an "exploitation" format like the others do, and when it does it does an incomplete job of it in most cases.
    6 internautes sur 7 ont trouvé ce commentaire utile 
    4.0 étoiles sur 5 Good overview, some weak points 18 août 2013
    Par JBassett - Publié sur Amazon.com
    Good overview of mobile application security with some interesting chapters on cellular network, mobile web, and mobile payment technology. The book is relatively brief (~300 pages) and tends to favor breadth over depth, so I would have liked to see some of the chapters expanded to include additional vulnerabilities/attack scenarios.
    3 internautes sur 3 ont trouvé ce commentaire utile 
    2.0 étoiles sur 5 Superficial book 23 mai 2014
    Par sdam52 - Publié sur Amazon.com
    Format:Format Kindle|Achat vérifié
    If you are a new Infosec professional or an IT manager who needs a high level overview of the Mobile security landscape, this is a good book. However, this book is by no means a hands on detail oriented guide that goes through standards, tools and techniques in detail. Not sure where the five star reviews are coming from.
    1 internautes sur 1 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 Thorough, well written and appeals to broad audience 5 octobre 2013
    Par Tcoopnj - Publié sur Amazon.com
    Format:Broché|Achat vérifié
    This is such a fun read. Lots of great and stimulating ideas spring from my head every time I read another chapter.

    It can get deep but most is a straightforward of vulnerabilities,hacks and how to avoid or close the hole, if possible.

    Android has so many unpatched versions out there. Oh and IOS is not as secure as the Apple Geniuses and sales rep say.

    Think of it this way. Android is Linux-based and IOS,like MAC OS are BSD Unix based. Due to all the versions of Android and the slow patch installations from carriers, more exploits still work.

    I highly recommend this book for security researchers, app developers and testers, as well as the millions of techie users of smartphones who want to get under the hood of these devices.
    5.0 étoiles sur 5 author Joel Shambray 2 juin 2014
    Par Cathy Gibbs - Publié sur Amazon.com
    Format:Broché|Achat vérifié
    Bought the book as one of a few resources to use for generating a training on Secure Mobile Development. One of the author's Joel S. was visiting the company I work with and brought two of his books to sign for us, but we are not allowed to take anything from anyone who does not work at our company. I happened to have this book in my trunk going from building to building like I do - so he got to sign this for me after all O) - great material in the book for training your mobile development teams on Secure Coding.
    Ces commentaires ont-ils été utiles ?   Dites-le-nous

    Discussions entre clients

    Le forum concernant ce produit
    Discussion Réponses Message le plus récent
    Pas de discussions pour l'instant

    Posez des questions, partagez votre opinion, gagnez en compréhension
    Démarrer une nouvelle discussion
    Première publication:
    Aller s'identifier

    Rechercher parmi les discussions des clients
    Rechercher dans toutes les discussions Amazon

    Rechercher des articles similaires par rubrique