eBooks-it.org Logo
eBooks-IT.org Inner Image

The Mobile Application Hacker's Handbook

The Mobile Application Hacker's Handbook Image

Book Details:

Publisher:John Wiley & Sons
Series: Wiley , Handbook
Author:Dominic Chell
Edition:1
ISBN-10:1118958500
ISBN-13:9781118958506
Pages:816
Published:Apr 03 2015
Posted:Mar 04 2016
Language:English
Book format:PDF
Book size:11.96 MB

Book Description:

See your app through a hackers eyes to find the real sources of vulnerability The Mobile Application Hackers Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hackers point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and crossplatform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeated Set up an environment for identifying insecurities and the data leakages that arise Develop extensions to bypass security controls and perform injection attacks Learn the different attacks that apply specifically to crossplatform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hackers trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hackers Handbook is a practical, comprehensive guide.

Download Link:

Related Books:

The Web Application Hacker's Handbook

Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook Image
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hac...

The Hacker's Handbook

The Strategy Behind Breaking Into and Defending Networks
The Hacker's Handbook Image
The Hackers Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruders. This book is divided into three parts. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, te...

Gray Hat Hacking

The Ethical Hacker's Handbook
Gray Hat Hacking Image
2nd Edition
A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in. --Bruce Potter, Founder, The Shmoo GroupVery highly recommended whether you are a seasoned professional or just starting out in the security business. --Simple Nomad, Hacker...



2007 - 2021 © eBooks-IT.org