Hacking exposed mobile : security secrets & solutions /

Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobil...

Full description

Main Author: Bergman, Neil.
Other Authors: Stanfield, Mike., Rouse, Jason., Scambray, Joel.
Format: Book
Published: New York : McGraw-Hill, [2013]
Physical Description: xxvii, 289 pages : illustrations ; 24 cm
Subjects:
LEADER 02100pam a2200433 i 4500
001 2013024712
003 DLC
005 20170712073400.0
008 130621s2013 nyua e 001 0 eng
010 |a  2013024712 
020 |a 9780071817011 (pbk.) :  |c $50.00 
020 |a 0071817018 (pbk.) :  |c $50.00 
035 |a (OCoLC)820788017 
040 |a DLC  |b eng  |c DLC  |e rda  |d IMmBT 
050 0 0 |a TK5105.59  |b .B464 2013 
082 0 0 |a 005.8  |2 23 
099 0 |a 005.8  |a Ber 
100 1 |a Bergman, Neil. 
245 1 0 |a Hacking exposed mobile :  |b security secrets & solutions /  |c Neil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray. 
246 3 |a Mobile security secrets & solutions 
264 1 |a New York :  |b McGraw-Hill,  |c [2013] 
300 |a xxvii, 289 pages :  |b illustrations ;  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index. 
520 0 |a Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications and payment systems. It offers strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently.--Excerpted from publisher. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Mobile computing  |x Security measures. 
650 0 |a Mobile communication systems  |x Security measures. 
650 0 |a Hackers. 
650 0 |a Computer crimes  |x Prevention. 
700 1 |a Stanfield, Mike. 
700 1 |a Rouse, Jason. 
700 1 |a Scambray, Joel. 
949 |a 005.8 Ber  |i 32020022729925  |k th  |l fnf  |m er  |t bk 
999 |a 864804