Hacking Exposed Mobile: Security Secrets & Solutions et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus
  • Tous les prix incluent la TVA.
Il ne reste plus que 3 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon.
Emballage cadeau disponible.
Quantité :1
Hacking Exposed: Mobile S... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par bookstotheworldfr
État: D'occasion: Très bon
Commentaire: Slight shelf wear, but overall vgc. Dispatched within 24 hours (weekdays only). Thousands of satisfied customers
Amazon rachète votre
article EUR 7,84 en chèque-cadeau.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

Hacking Exposed: Mobile Security Secrets & Solutions (Anglais) Broché – 1 août 2013

Voir les 2 formats et éditions Masquer les autres formats et éditions
Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
"Veuillez réessayer"
EUR 38,79
EUR 26,87 EUR 21,00

Offres spéciales et liens associés

Descriptions du produit

Présentation de l'éditeur

Proven security tactics for today's mobile apps,devices, and networks

"A great overview of the new threats created by mobile devices.... The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depthunderstanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA

Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.

  • Tour the mobile risk ecosystem with expert guides to both attack and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using OAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling toiOS- and Android-specific tips
  • Get started quickly using our mobile pen testing and consumer security checklists

  • Biographie de l'auteur

    Neil Bergman is a senior security consultant at Cigital, a leading software security firm, where he conducts and leads penetration testing, code review, and threat modeling of software on behalf of major organizations.

    Mike Stanfield is a security consultant at Cigital where he specializes in security assessments for the iOS, Android, and Blackberry platforms.

    Jason Rouse is a security architect on the team responsible for the security of Bloomberg LP’s products and services.

    Joel Scambray, CISSP, is a managing principal at Cigital and the bestselling coauthor of seven editions of Hacking Exposed.

    Vendez cet article - Prix de rachat jusqu'à EUR 7,84
    Vendez Hacking Exposed: Mobile Security Secrets & Solutions contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 7,84, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

    Détails sur le produit

    En savoir plus sur les auteurs

    Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

    Dans ce livre (En savoir plus)
    Parcourir les pages échantillon
    Couverture | Copyright | Table des matières | Extrait | Index
    Rechercher dans ce livre:

    Commentaires en ligne

    Il n'y a pas encore de commentaires clients sur Amazon.fr
    5 étoiles
    4 étoiles
    3 étoiles
    2 étoiles
    1 étoiles

    Commentaires client les plus utiles sur Amazon.com (beta)

    Amazon.com: 13 commentaires
    11 internautes sur 14 ont trouvé ce commentaire utile 
    Good & Bad 14 août 2013
    Par Amazon Customer - Publié sur Amazon.com
    Format: Format Kindle Achat vérifié
    Being a security professional, and being a mobile developer (and advocate) I find that the book is largely a regurgitation of online content - in a rather long, drawn out process. I have read several other "Hacking Exposed" books and have found them well presented and with good coverage and knowledge transfer. I don't find this one at the same level. Mediocre coverage (for instance could have gotten into the cellular telephony aspects deeper), and mediocre knowledge transfer.

    If you know nothing about mobile or mobile security, this might be a kick-ass book for you. If you know something, it is a snoozer trying to get to anything novel - which you don't.

    I am also disappointed that unlike previous Hacking Exposed books, this one does not take an "exploitation" format like the others do, and when it does it does an incomplete job of it in most cases.
    6 internautes sur 7 ont trouvé ce commentaire utile 
    Good overview, some weak points 18 août 2013
    Par JBassett - Publié sur Amazon.com
    Format: Broché
    Good overview of mobile application security with some interesting chapters on cellular network, mobile web, and mobile payment technology. The book is relatively brief (~300 pages) and tends to favor breadth over depth, so I would have liked to see some of the chapters expanded to include additional vulnerabilities/attack scenarios.
    1 internautes sur 1 ont trouvé ce commentaire utile 
    Thorough, well written and appeals to broad audience 5 octobre 2013
    Par Tcoopnj - Publié sur Amazon.com
    Format: Broché Achat vérifié
    This is such a fun read. Lots of great and stimulating ideas spring from my head every time I read another chapter.

    It can get deep but most is a straightforward of vulnerabilities,hacks and how to avoid or close the hole, if possible.

    Android has so many unpatched versions out there. Oh and IOS is not as secure as the Apple Geniuses and sales rep say.

    Think of it this way. Android is Linux-based and IOS,like MAC OS are BSD Unix based. Due to all the versions of Android and the slow patch installations from carriers, more exploits still work.

    I highly recommend this book for security researchers, app developers and testers, as well as the millions of techie users of smartphones who want to get under the hood of these devices.
    1 internautes sur 1 ont trouvé ce commentaire utile 
    Par drake - Publié sur Amazon.com
    Format: Broché Achat vérifié
    I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.

    They are Great Books!! ---That is my opinion!
    1 internautes sur 1 ont trouvé ce commentaire utile 
    Superficial book 23 mai 2014
    Par sdam52 - Publié sur Amazon.com
    Format: Format Kindle Achat vérifié
    If you are a new Infosec professional or an IT manager who needs a high level overview of the Mobile security landscape, this is a good book. However, this book is by no means a hands on detail oriented guide that goes through standards, tools and techniques in detail. Not sure where the five star reviews are coming from.
    Ces commentaires ont-ils été utiles ? Dites-le-nous


    Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?