Personnaliser

OK

Hacking Exposed Mobile - Bergman, Neil

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

30,99 €

Occasion · Très Bon État

  • Ou 7,75 € /mois

    • Livraison : 0,00 €
    • Livré entre le 9 et le 18 mai
    Voir les modes de livraison

    USAMedia

    PRO Vendeur favori

    4,6/5 sur + de 1 000 ventes

    Service client à l'écoute et une politique de retour sans tracas - Livraison des USA en 3 a 4 semaines (2 mois si circonstances exceptionnelles) - La plupart de nos titres sont en anglais, sauf indication contraire. N'hésitez pas à nous envoyer un e-... Voir plus
    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Hacking Exposed Mobile Format Broché  - Livre Sciences de la vie et de la terre

        Note : 0 0 avis sur Hacking Exposed Mobile Format Broché  - Livre Sciences de la vie et de la terre

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Hacking Exposed Mobile Format Broché

         - Livre Sciences de la vie et de la terre

        Livre Sciences de la vie et de la terre - Bergman, Neil - 01/07/2013 - Broché - Langue : Anglais

        . .

      • Auteur(s) : Bergman, Neil - Rouse, Jason - Stanfield, Mike
      • Editeur : Mcgraw-Hill Education
      • Langue : Anglais
      • Parution : 01/07/2013
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 322.0
      • Expédition : 552
      • Dimensions : 23.3 x 18.4 x 17.0
      • ISBN : 0071817018



      • Résumé :

        Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

        Proven security tactics for today's mobile apps,devices, and networks

        A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter. -- Slashdot

        Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depthunderstanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained. -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA

        Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.

      • Tour the mobile risk ecosystem with expert guides to both attack and defense
      • Learn how cellular network attacks compromise devices over-the-air
      • See the latest Android and iOS attacks in action, and learn how to stop them
      • Delve into mobile malware at the code level to understand how to write resilient apps
      • Defend against server-side mobile attacks, including SQL and XML injection
      • Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges
      • Develop stronger mobile authentication routines using OAuth and SAML
      • Get comprehensive mobile app development security guidance covering everything from threat modeling toiOS- and Android-specific tips
      • Get started quickly using our mobile pen testing and consumer security checklists

      • ...

        Biographie:
        Neil Bergman is a senior security consultant at Cigital. He has been involved in leading and conducting penetration testing, code review, and architecture risk analysis of critical applications for industry-leading financial and software companies. Neil has conducted security assessments on a multitude of mobile platforms such as Android, iOS, and RIM in additional to conducting numerous assessments against web services, web applications, and thick clients. His primary areas of interest include mobile and web application vulnerability discovery and exploitation. Neil graduated from James Madison University with a master's degree in Computer Science and received a bachelor's degree in Computer Science from North Carolina State University....

        Sommaire:
        Proven security tactics for today's mobile apps, devices, and networks A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter. -- Slashdot Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained. -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems. Tour the mobile risk ecosystem with expert guides to both attack and defense Learn how cellular network attacks compromise devices over-the-air See the latest Android and iOS attacks in action, and learn how to stop them Delve into mobile malware at the code level to understand how to write resilient apps Defend against server-side mobile attacks, including SQL and XML injection Discover mobile web attacks, including abuse of custom URI schemes and JavaScript bridges Develop stronger mobile authentication routines using OAuth and SAML Get comprehensive mobile app development security guidance covering everything from threat modeling to iOS- and Android-specific tips Get started quickly using our mobile pen testing and consumer security checklists...

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com