Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible
 

Hacking Exposed Mobile: Security Secrets & Solutions [Format Kindle]

Neil Bergman , Mike Stanfield , Jason Rouse , Joel Scambray , Sarath Geethakumar , Swapnil Deshmukh , Scott Matsumoto , John Steven , Mike Price

Prix éditeur - format imprimé : EUR 47,17
Prix Kindle : EUR 29,09 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 18,08 (38%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 29,09  
Broché EUR 38,79  





Descriptions du produit

Présentation de l'éditeur

Proven security tactics for today's mobile apps, devices, and networks

"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA

Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.

  • Tour the mobile risk ecosystem with expert guides to both attack and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using OAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips
  • Get started quickly using our mobile pen testing and consumer security checklists
  • Biographie de l'auteur

    Neil Bergman is a senior security consultant at Cigital, a leading software security firm, where he conducts and leads penetration testing, code review, and threat modeling of software on behalf of major organizations.

    Mike Stanfield is a security consultant at Cigital where he specializes in security assessments for the iOS, Android, and Blackberry platforms.

    Jason Rouse is a security architect on the team responsible for the security of Bloomberg LP’s products and services.

    Joel Scambray, CISSP, is a managing principal at Cigital and the bestselling coauthor of seven editions of Hacking Exposed.


    Détails sur le produit

    • Format : Format Kindle
    • Taille du fichier : 35007 KB
    • Nombre de pages de l'édition imprimée : 320 pages
    • Utilisation simultanée de l'appareil : Jusqu'à  appareils simultanés, selon les limites de l'éditeur
    • Editeur : McGraw-Hill Osborne Media; Édition : 1 (30 juillet 2013)
    • Vendu par : Amazon Media EU S.à r.l.
    • Langue : Anglais
    • ASIN: B00COKLVKC
    • Synthèse vocale : Activée
    • X-Ray :
    • Word Wise: Non activé
    • Classement des meilleures ventes d'Amazon: n°85.404 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
    •  Souhaitez-vous faire modifier les images ?


    En savoir plus sur les auteurs

    Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

    Commentaires en ligne

    Il n'y a pas encore de commentaires clients sur Amazon.fr
    5 étoiles
    4 étoiles
    3 étoiles
    2 étoiles
    1 étoiles
    Commentaires client les plus utiles sur Amazon.com (beta)
    Amazon.com: 4.2 étoiles sur 5  13 commentaires
    11 internautes sur 14 ont trouvé ce commentaire utile 
    3.0 étoiles sur 5 Good & Bad 14 août 2013
    Par Amazon Customer - Publié sur Amazon.com
    Format:Format Kindle|Achat vérifié
    Being a security professional, and being a mobile developer (and advocate) I find that the book is largely a regurgitation of online content - in a rather long, drawn out process. I have read several other "Hacking Exposed" books and have found them well presented and with good coverage and knowledge transfer. I don't find this one at the same level. Mediocre coverage (for instance could have gotten into the cellular telephony aspects deeper), and mediocre knowledge transfer.

    If you know nothing about mobile or mobile security, this might be a kick-ass book for you. If you know something, it is a snoozer trying to get to anything novel - which you don't.

    I am also disappointed that unlike previous Hacking Exposed books, this one does not take an "exploitation" format like the others do, and when it does it does an incomplete job of it in most cases.
    6 internautes sur 7 ont trouvé ce commentaire utile 
    4.0 étoiles sur 5 Good overview, some weak points 18 août 2013
    Par JBassett - Publié sur Amazon.com
    Format:Broché
    Good overview of mobile application security with some interesting chapters on cellular network, mobile web, and mobile payment technology. The book is relatively brief (~300 pages) and tends to favor breadth over depth, so I would have liked to see some of the chapters expanded to include additional vulnerabilities/attack scenarios.
    1 internautes sur 1 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 Thorough, well written and appeals to broad audience 5 octobre 2013
    Par Tcoopnj - Publié sur Amazon.com
    Format:Broché|Achat vérifié
    This is such a fun read. Lots of great and stimulating ideas spring from my head every time I read another chapter.

    It can get deep but most is a straightforward of vulnerabilities,hacks and how to avoid or close the hole, if possible.

    Android has so many unpatched versions out there. Oh and IOS is not as secure as the Apple Geniuses and sales rep say.

    Think of it this way. Android is Linux-based and IOS,like MAC OS are BSD Unix based. Due to all the versions of Android and the slow patch installations from carriers, more exploits still work.

    I highly recommend this book for security researchers, app developers and testers, as well as the millions of techie users of smartphones who want to get under the hood of these devices.
    1 internautes sur 1 ont trouvé ce commentaire utile 
    5.0 étoiles sur 5 HACKING EXPOSED BOOKS ARE GREAT!! 1 novembre 2013
    Par drake - Publié sur Amazon.com
    Format:Broché|Achat vérifié
    I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

    They are Great Books!! ---That is my opinion!
    1 internautes sur 1 ont trouvé ce commentaire utile 
    2.0 étoiles sur 5 Superficial book 23 mai 2014
    Par sdam52 - Publié sur Amazon.com
    Format:Format Kindle|Achat vérifié
    If you are a new Infosec professional or an IT manager who needs a high level overview of the Mobile security landscape, this is a good book. However, this book is by no means a hands on detail oriented guide that goes through standards, tools and techniques in detail. Not sure where the five star reviews are coming from.
    Ces commentaires ont-ils été utiles ?   Dites-le-nous

    Discussions entre clients

    Le forum concernant ce produit
    Discussion Réponses Message le plus récent
    Pas de discussions pour l'instant

    Posez des questions, partagez votre opinion, gagnez en compréhension
    Démarrer une nouvelle discussion
    Thème:
    Première publication:
    Aller s'identifier
     

    Rechercher parmi les discussions des clients
    Rechercher dans toutes les discussions Amazon
       


    Rechercher des articles similaires par rubrique