• Kapcsolat

  • Hírlevél

  • Rólunk

  • Szállítási lehetőségek

  • Prospero könyvpiaci podcast

  • Hacking Exposed Mobile: Security Secrets & Solutions

    Hacking Exposed Mobile by Bergman, Neil; Stanfield, Mike; Rouse, Jason;

    Security Secrets & Solutions

    Sorozatcím: NETWORKING & COMM - OMG;

      • 10% KEDVEZMÉNY?

      • A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
      • Kiadói listaár GBP 54.99
      • Az ár azért becsült, mert a rendelés pillanatában nem lehet pontosan tudni, hogy a beérkezéskor milyen lesz a forint árfolyama az adott termék eredeti devizájához képest. Ha a forint romlana, kissé többet, ha javulna, kissé kevesebbet kell majd fizetnie.

        26 271 Ft (25 020 Ft + 5% áfa)
      • Kedvezmény(ek) 10% (cc. 2 627 Ft off)
      • Kedvezményes ár 23 644 Ft (22 518 Ft + 5% áfa)

    26 271 Ft

    db

    Beszerezhetőség

    Megrendelésre a kiadó utánnyomja a könyvet. Rendelhető, de a szokásosnál kicsit lassabban érkezik meg.

    Why don't you give exact delivery time?

    A beszerzés időigényét az eddigi tapasztalatokra alapozva adjuk meg. Azért becsült, mert a terméket külföldről hozzuk be, így a kiadó kiszolgálásának pillanatnyi gyorsaságától is függ. A megadottnál gyorsabb és lassabb szállítás is elképzelhető, de mindent megteszünk, hogy Ön a lehető leghamarabb jusson hozzá a termékhez.

    A termék adatai:

    • Kiadó McGraw Hill
    • Megjelenés dátuma 2013. július 16.

    • ISBN 9780071817011
    • Kötéstípus Puhakötés
    • Terjedelem320 oldal
    • Méret 223x200x15 mm
    • Súly 549 g
    • Nyelv angol
    • 0

    Kategóriák

    Rövid leírás:

    Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits—from the bestselling coauthor of the original Hacking Exposed

    Több

    Hosszú leírás:

    Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

    Proven security tactics for today's mobile apps,devices, and networks

    "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

    Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depthunderstanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA

    Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.

  • Tour the mobile risk ecosystem with expert guides to both attack and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using OAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling toiOS- and Android-specific tips
  • Get started quickly using our mobile pen testing and consumer security checklists



  • Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

    Proven security tactics for today's mobile apps,devices, and networks

    "A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot

    Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depthunderstanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA

    Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.

  • Tour the mobile risk ecosystem with expert guides to both attack and defense
  • Learn how cellular network attacks compromise devices over-the-air
  • See the latest Android and iOS attacks in action, and learn how to stop them
  • Delve into mobile malware at the code level to understand how to write resilient apps
  • Defend against server-side mobile attacks, including SQL and XML injection
  • Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges
  • Develop stronger mobile authentication routines using OAuth and SAML
  • Get comprehensive mobile app development security guidance covering everything from threat modeling toiOS- and Android-specific tips
  • Get started quickly using our mobile pen testing and consumer security checklists

  • Több

    Tartalomjegyzék:

    Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits—from the bestselling coauthor of the original Hacking Exposed

    Több
    0