The Mobile Application Hacker's Handbook

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book The Mobile Application Hacker's Handbook by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse, Wiley
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse ISBN: 9781118958513
Publisher: Wiley Publication: February 17, 2015
Imprint: Wiley Language: English
Author: Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
ISBN: 9781118958513
Publisher: Wiley
Publication: February 17, 2015
Imprint: Wiley
Language: English

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.

  • Understand the ways data can be stored, and how cryptography is defeated
  • Set up an environment for identifying insecurities and the data leakages that arise
  • Develop extensions to bypass security controls and perform injection attacks
  • Learn the different attacks that apply specifically to cross-platform apps

IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.

IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

More books from Wiley

Cover of the book The Strange Non-death of Neo-liberalism by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book QR Codes Kill Kittens by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Digital Spectral Analysis by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Biennials, Triennials, and Documenta by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Statistics for Earth and Environmental Scientists by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Equity Asset Valuation Workbook by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book The China Crisis by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Managing Hedge Fund Risk and Financing by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Immunology by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Crash Proof 2.0 by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Working with Risk by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Multiple Sclerosis For Dummies by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Markets in Profile by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book Systematic Reviews in Health Care by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
Cover of the book The Tax Law of Private Foundations by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy