Book description
Proven security tactics for today's mobile apps, devices, and networks
"A great overview of the new threats created by mobile devices. ...The authors have heaps of experience in the topics and bring that to every chapter." -- Slashdot
Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures--so they can leverage the power of mobile platforms while ensuring that security risks are contained." -- Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA
Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile: Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems.
Table of contents
- Cover
- HACKING EXPOSED™: MOBILE SECURITY SECRETS & SOLUTIONS
- Copyright Page
- Dedication
- About the Authors
- At A Glance
- Contents
- Foreword
- Acknowledgments
- Introduction
- 1 The Mobile Risk Ecosystem
- 2 Hacking the Cellular Network
- 3 iOS
- 4 Android
- 5 Mobile Malware
- 6 Mobile Services and Mobile Web
- 7 Mobile Device Management
- 8 Mobile Development Security
- 9 Mobile Payments
- A Consumer Security Checklist
- B Mobile Application Penetration Testing Toolkit
- Index
Product information
- Title: Hacking Exposed Mobile
- Author(s):
- Release date: August 2013
- Publisher(s): McGraw-Hill
- ISBN: 9780071817028
You might also like
book
Hacking Android
Explore every nook and cranny of the Android OS to modify your device and guard it …
book
Hacking Web Intelligence
Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the …
book
Google Hacking for Penetration Testers, 3rd Edition
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, …
book
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, 2nd Edition
The latest techniques for averting UC disaster Establish a holistic security stance by learning to view …