Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200901 a 4500 
001    593356387 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cnu---unuuu 
008    100402s2010    nyua    ob    001 0 eng d 
010      2009051530 
015    GBA9B5341|2bnb 
016 7  015432573|2Uk 
019    647895205|a670428518|a685059085|a712988145|a867667314
       |a1103263725|a1113676312|a1129375930|a1152971899
       |a1192338831|a1240523515 
020    9780071633574|q(electronic bk.) 
020    007163357X|q(electronic bk.) 
029 1  AU@|b000047156124 
029 1  AU@|b000053260373 
029 1  DEBSZ|b355394073 
029 1  HEBIS|b291467458 
029 1  NZ1|b13702604 
029 1  AU@|b000065313459 
035    (OCoLC)593356387|z(OCoLC)647895205|z(OCoLC)670428518
       |z(OCoLC)685059085|z(OCoLC)712988145|z(OCoLC)867667314
       |z(OCoLC)1103263725|z(OCoLC)1113676312|z(OCoLC)1129375930
       |z(OCoLC)1152971899|z(OCoLC)1192338831|z(OCoLC)1240523515 
037    CL0500000075|bSafari Books Online 
037    E0CBDB85-26BC-45A4-922A-15355B9EB20D|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    N$T|beng|epn|cN$T|dYDXCP|dUMI|dE7B|dCOO|dCEF|dOCLCQ|dMUQ
       |dOCLCQ|dB24X7|dDEBSZ|dOCLCQ|dTEFOD|dOCLCQ|dNXW|dPR$
       |dOCLCQ|dTEFOD|dOCLCQ|dEBLCP|dESU|dOCLCQ|dTOH|dVT2|dC6I
       |dUHL|dOCLCQ|dUKAHL|dOCLCO|dOCLCF|dOCLCQ|dOCLCO|dOCLCL
       |dOCLCQ 
049    INap 
082 04 005.8 
082 04 005.8|222 
099    eBook O’Reilly for Public Libraries 
100 1  Dwivedi, Himanshu. 
245 10 Mobile application security /|cHimanshu Dwivedi, Chris 
       Clark, David Thiel.|h[O'Reilly electronic resource] 
260    New York :|bMcGraw-Hill,|c©2010. 
300    1 online resource (xxii, 408 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  Cover Page -- Mobile Application Security -- Copyright 
       Page -- About the Authors -- Dedication -- Contents -- 
       Acknowledgments -- Introduction -- Part I Mobile Platforms
       -- Chapter 1 Top Mobile Issues and Development Strategies 
       -- Top Issues Facing Mobile Devices -- Physical Security -
       - Secure Data Storage (on Disk) -- Strong Authentication 
       with Poor Keyboards -- Multiple-User Support with Security
       -- Safe Browsing Environment -- Secure Operating Systems -
       - Application Isolation -- Information Disclosure -- Virus,
       Worms, Trojans, Spyware, and Malware -- Difficult Patching
       /Update Process 
505 8  Strict Use and Enforcement of SSL -- Phishing -- Cross-
       Site Request Forgery (CSRF) -- Location Privacy/Security -
       - Insecure Device Drivers -- Multifactor Authentication --
       Tips for Secure Mobile Application Development -- Leverage
       TLS/SSL -- Follow Secure Programming Practices -- Validate
       Input -- Leverage the Permissions Model Used by the OS -- 
       Use the Least Privilege Model for System Access -- Store 
       Sensitive Information Properly -- Sign the Application's 
       Code -- Figure Out a Secure and Strong Update Process -- 
       Understand the Mobile Browser's Security Strengths and 
       Limitations 
505 8  Zero Out the Nonthreats -- Use Secure/Intuitive Mobile 
       URLs -- Conclusion -- Chapter 2 Android Security -- 
       Development and Debugging on Android -- Android's 
       Securable IPC Mechanisms -- Activities -- Broadcasts -- 
       Services -- ContentProviders -- Binder -- Android's 
       Security Model -- Android Permissions Review -- Creating 
       New Manifest Permissions -- Intents -- Intent Review -- 
       IntentFilters -- Activities -- Broadcasts -- Receiving 
       Broadcast Intents -- Safely Sending Broadcast Intents -- 
       Sticky Broadcasts -- Services -- ContentProviders -- 
       Avoiding SQL Injection -- Intent Reflection 
505 8  Files and Preferences -- Mass Storage -- Binder Interfaces
       -- Security by Caller Permission or Identity Checking -- 
       Binder Reference Security -- Android Security Tools -- 
       Manifest Explorer -- Package Play -- Intent Sniffer -- 
       Intent Fuzzer -- Conclusion -- Chapter 3 The Apple iPhone 
       -- History -- The iPhone and OS X -- Breaking Out, 
       Breaking In -- iPhone SDK -- Future -- Development -- 
       Decompilation and Disassembly -- Preventing Reverse-
       Engineering -- Security Testing -- Buffer Overflows -- 
       Integer Overflows -- Format String Attacks -- Double-Frees
       -- Static Analysis -- Application Format 
505 8  Build and Packaging -- Distribution: The Apple Store -- 
       Code Signing -- Executing Unsigned Code -- Permissions and
       User Controls -- Sandboxing -- Exploit Mitigation -- 
       Permissions -- Local Data Storage: Files, Permissions, and
       Encryption -- SQLite Storage -- iPhone Keychain Storage --
       Shared Keychain Storage -- Adding Certificates to the 
       Certificate Store -- Acquiring Entropy -- Networking -- 
       The URL Loading API -- NSStreams -- Peer to Peer (P2P) -- 
       Push Notifications, Copy/Paste, and Other IPC -- Push 
       Notifications -- UIPasteboard -- Conclusion -- Chapter 4 
       Windows Mobile Security 
520    "Implement a systematic approach to security in your 
       mobile application development with help from this 
       practical guide. Featuring case studies, code examples, 
       and best practices, Mobile Application Security details 
       how to protect against vulnerabilities in the latest 
       smartphone and PDA platforms. Maximize isolation, lockdown
       internal and removable storage, work with sandboxing and 
       signing, and encrypt sensitive user information. 
       Safeguards against viruses, worms, malware, and buffer 
       overflow exploits are also covered in this comprehensive 
       resource"--Resource description page. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Mobile communication systems|xSecurity measures. 
650  0 Mobile computing|xSecurity measures. 
650  0 Mobile communication systems. 
650  0 Mobile computing. 
650  6 Radiocommunications mobiles. 
650  6 Informatique mobile. 
650  6 Radiocommunications mobiles|xSécurité|xMesures. 
650  6 Informatique mobile|xSécurité|xMesures. 
650  7 Mobile communication systems|xSecurity measures.|2blmlsh 
650  7 Mobile computing|xSecurity measures.|2blmlsh 
650  7 Mobile communication systems|2fast 
650  7 Mobile computing|2fast 
700 1  Clark, Chris,|d1980-|1https://id.oclc.org/worldcat/entity/
       E39PBJf8wWftjMG3phBTq7RkDq 
700 1  Thiel, David V. 
776 08 |iPrint version:|aDwivedi, Himanshu.|tMobile application 
       security.|dNew York : McGraw-Hill, ©2010|z9780071633567
       |w(DLC)  2009051530|w(OCoLC)496159950 
830  0 IT Pro. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780071633567/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    ProQuest Ebook Central|bEBLB|nEBL6258940 
938    Askews and Holts Library Services|bASKH|nAH26367929 
938    Books 24x7|bB247|nbks00035970 
938    ProQuest Ebook Central|bEBLB|nEBL4657893 
938    ProQuest Ebook Central|bEBLB|nEBL4668192 
938    ebrary|bEBRY|nebr10373316 
938    EBSCOhost|bEBSC|n315674 
938    YBP Library Services|bYANK|n3200982 
994    92|bJFN