소장자료
LDR | 03297nam a22003738a 4500 | ||
001 | 0092273036▲ | ||
005 | 20180519010646▲ | ||
008 | 131115s2013 nyu 000 0 eng ▲ | ||
010 | ▼a2013024712▲ | ||
020 | ▼a9780071817011 (paperback)▲ | ||
020 | ▼a0071817018 (paperback)▲ | ||
035 | ▼a(KERIS)REF000017191529▲ | ||
040 | ▼aDLC▼beng▼cDLC▼erda▲ | ||
042 | ▼apcc▲ | ||
050 | 0 | 0 | ▼aTK5105.59▼b.B464 2013▲ |
082 | 0 | 0 | ▼a005.8▼221▲ |
090 | ▼a005.8▼bB499h▲ | ||
100 | 1 | ▼aBergman, Neil.▲ | |
245 | 1 | 0 | ▼aHacking exposed mobile :▼bsecurity secrets & solutions /▼cNeil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray.▲ |
260 | ▼aNew York :▼bMcGraw-Hill Education,▼c2013.▲ | ||
300 | ▼axxvii, 289 p. ;▼c24cm.▲ | ||
505 | 0 | ▼aThe Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit.▲ | |
520 | 2 | ▼a"Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"--▼cProvided by publisher.▲ | |
520 | 2 | ▼a"Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"--▼cProvided by publisher.▲ | |
650 | 0 | ▼aComputer networks▼xSecurity measures.▲ | |
650 | 0 | ▼aMobile computing▼xSecurity measures.▲ | |
650 | 0 | ▼aMobile communication systems▼xSecurity measures.▲ | |
650 | 0 | ▼aComputer hackers.▲ | |
650 | 0 | ▼aComputer crimes▼xPrevention.▲ | |
650 | 7 | ▼aCOMPUTERS / Networking / Security.▼2bisacsh▲ | |
700 | 1 | ▼aStanfield, Mike.▲ | |
700 | 1 | ▼aRouse, Jason.▲ | |
700 | 1 | ▼aScambray, Joel.▲ | |
999 | ▼c장화옥▲ |
Hacking exposed mobile :security secrets & solutions
자료유형
국외단행본
서명/책임사항
Hacking exposed mobile : security secrets & solutions / Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray.
발행사항
New York : McGraw-Hill Education , 2013.
형태사항
xxvii, 289 p. ; 24cm.
내용주기
The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit.
요약주기
"Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"-- Provided by publisher./"Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"-- Provided by publisher./
주제
ISBN
9780071817011 (paperback) 0071817018 (paperback)
청구기호
005.8 B499h
소장정보
예도서예약
서서가에없는책 신고
보보존서고신청
캠캠퍼스대출
우우선정리신청
배자료배달신청
문문자발송
출청구기호출력
학소장학술지 원문서비스
등록번호 | 청구기호 | 소장처 | 도서상태 | 반납예정일 | 서비스 |
---|
북토크
자유롭게 책을 읽고
느낀점을 적어주세요
글쓰기
느낀점을 적어주세요
청구기호 브라우징
관련 인기대출 도서