Hacking exposed

"Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack...

Full description

Permalink: http://skupni.nsk.hr/Record/fer.KOHA-OAI-FER:42946/Details
Glavni autor: Bergman, Neil (-)
Ostali autori: Stanfield, Mike (-), Rouse, Jason, Scambray, Joel
Vrsta građe: Knjiga
Jezik: eng
Impresum: New York McGraw-Hill Education, 2013
Predmet:
LEADER 02819nam a2200361 c 4500
003 DE-601
005 20140107144233.0
008 130702s2013 xxu 000 0 eng d
010 |a  2013024712 
020 |a 0071817018 (paperback) 
020 |a 9780071817011 (paperback) 
040 |a GBVCP  |b ger  |e rakwb  |c HR-ZaFER 
041 0 |a eng 
050 0 |a TK5105.59 
082 0 0 |a 005.8 
082 0 9 |a COM043050 
084 |a ST 276  |2 rvk 
100 1 |a Bergman, Neil 
245 1 0 |a Hacking exposed:  |b mobile security secrets and solutions /  |c Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray 
260 3 |a New York  |b McGraw-Hill Education  |c 2013 
300 |a xxvii, 289 str.:  |b ilustr.;  |c 24 cm 
520 |a "Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"-- 
520 |a "Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"-- 
650 0 |a Computer networks  |x Security measures 
650 0 |a Mobile computing  |x Security measures 
650 0 |a Mobile communication systems  |x Security measures 
650 0 |a Computer hackers 
650 0 |a Computer crimes  |x Prevention 
700 1 |a Stanfield, Mike 
700 1 |a Rouse, Jason 
700 1 |a Scambray, Joel 
942 |2 udc  |c K 
999 |c 42946  |d 42946