LEADER 00000cam a2200901 a 4500 001 593356387 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu---unuuu 008 100402s2010 nyua ob 001 0 eng d 010 2009051530 015 GBA9B5341|2bnb 016 7 015432573|2Uk 019 647895205|a670428518|a685059085|a712988145|a867667314 |a1103263725|a1113676312|a1129375930|a1152971899 |a1192338831|a1240523515 020 9780071633574|q(electronic bk.) 020 007163357X|q(electronic bk.) 029 1 AU@|b000047156124 029 1 AU@|b000053260373 029 1 DEBSZ|b355394073 029 1 HEBIS|b291467458 029 1 NZ1|b13702604 029 1 AU@|b000065313459 035 (OCoLC)593356387|z(OCoLC)647895205|z(OCoLC)670428518 |z(OCoLC)685059085|z(OCoLC)712988145|z(OCoLC)867667314 |z(OCoLC)1103263725|z(OCoLC)1113676312|z(OCoLC)1129375930 |z(OCoLC)1152971899|z(OCoLC)1192338831|z(OCoLC)1240523515 037 CL0500000075|bSafari Books Online 037 E0CBDB85-26BC-45A4-922A-15355B9EB20D|bOverDrive, Inc. |nhttp://www.overdrive.com 040 N$T|beng|epn|cN$T|dYDXCP|dUMI|dE7B|dCOO|dCEF|dOCLCQ|dMUQ |dOCLCQ|dB24X7|dDEBSZ|dOCLCQ|dTEFOD|dOCLCQ|dNXW|dPR$ |dOCLCQ|dTEFOD|dOCLCQ|dEBLCP|dESU|dOCLCQ|dTOH|dVT2|dC6I |dUHL|dOCLCQ|dUKAHL|dOCLCO|dOCLCF|dOCLCQ|dOCLCO|dOCLCL |dOCLCQ 049 INap 082 04 005.8 082 04 005.8|222 099 eBook O’Reilly for Public Libraries 100 1 Dwivedi, Himanshu. 245 10 Mobile application security /|cHimanshu Dwivedi, Chris Clark, David Thiel.|h[O'Reilly electronic resource] 260 New York :|bMcGraw-Hill,|c©2010. 300 1 online resource (xxii, 408 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 504 Includes bibliographical references and index. 505 0 Cover Page -- Mobile Application Security -- Copyright Page -- About the Authors -- Dedication -- Contents -- Acknowledgments -- Introduction -- Part I Mobile Platforms -- Chapter 1 Top Mobile Issues and Development Strategies -- Top Issues Facing Mobile Devices -- Physical Security - - Secure Data Storage (on Disk) -- Strong Authentication with Poor Keyboards -- Multiple-User Support with Security -- Safe Browsing Environment -- Secure Operating Systems - - Application Isolation -- Information Disclosure -- Virus, Worms, Trojans, Spyware, and Malware -- Difficult Patching /Update Process 505 8 Strict Use and Enforcement of SSL -- Phishing -- Cross- Site Request Forgery (CSRF) -- Location Privacy/Security - - Insecure Device Drivers -- Multifactor Authentication -- Tips for Secure Mobile Application Development -- Leverage TLS/SSL -- Follow Secure Programming Practices -- Validate Input -- Leverage the Permissions Model Used by the OS -- Use the Least Privilege Model for System Access -- Store Sensitive Information Properly -- Sign the Application's Code -- Figure Out a Secure and Strong Update Process -- Understand the Mobile Browser's Security Strengths and Limitations 505 8 Zero Out the Nonthreats -- Use Secure/Intuitive Mobile URLs -- Conclusion -- Chapter 2 Android Security -- Development and Debugging on Android -- Android's Securable IPC Mechanisms -- Activities -- Broadcasts -- Services -- ContentProviders -- Binder -- Android's Security Model -- Android Permissions Review -- Creating New Manifest Permissions -- Intents -- Intent Review -- IntentFilters -- Activities -- Broadcasts -- Receiving Broadcast Intents -- Safely Sending Broadcast Intents -- Sticky Broadcasts -- Services -- ContentProviders -- Avoiding SQL Injection -- Intent Reflection 505 8 Files and Preferences -- Mass Storage -- Binder Interfaces -- Security by Caller Permission or Identity Checking -- Binder Reference Security -- Android Security Tools -- Manifest Explorer -- Package Play -- Intent Sniffer -- Intent Fuzzer -- Conclusion -- Chapter 3 The Apple iPhone -- History -- The iPhone and OS X -- Breaking Out, Breaking In -- iPhone SDK -- Future -- Development -- Decompilation and Disassembly -- Preventing Reverse- Engineering -- Security Testing -- Buffer Overflows -- Integer Overflows -- Format String Attacks -- Double-Frees -- Static Analysis -- Application Format 505 8 Build and Packaging -- Distribution: The Apple Store -- Code Signing -- Executing Unsigned Code -- Permissions and User Controls -- Sandboxing -- Exploit Mitigation -- Permissions -- Local Data Storage: Files, Permissions, and Encryption -- SQLite Storage -- iPhone Keychain Storage -- Shared Keychain Storage -- Adding Certificates to the Certificate Store -- Acquiring Entropy -- Networking -- The URL Loading API -- NSStreams -- Peer to Peer (P2P) -- Push Notifications, Copy/Paste, and Other IPC -- Push Notifications -- UIPasteboard -- Conclusion -- Chapter 4 Windows Mobile Security 520 "Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource"--Resource description page. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Mobile communication systems|xSecurity measures. 650 0 Mobile computing|xSecurity measures. 650 0 Mobile communication systems. 650 0 Mobile computing. 650 6 Radiocommunications mobiles. 650 6 Informatique mobile. 650 6 Radiocommunications mobiles|xSécurité|xMesures. 650 6 Informatique mobile|xSécurité|xMesures. 650 7 Mobile communication systems|xSecurity measures.|2blmlsh 650 7 Mobile computing|xSecurity measures.|2blmlsh 650 7 Mobile communication systems|2fast 650 7 Mobile computing|2fast 700 1 Clark, Chris,|d1980-|1https://id.oclc.org/worldcat/entity/ E39PBJf8wWftjMG3phBTq7RkDq 700 1 Thiel, David V. 776 08 |iPrint version:|aDwivedi, Himanshu.|tMobile application security.|dNew York : McGraw-Hill, ©2010|z9780071633567 |w(DLC) 2009051530|w(OCoLC)496159950 830 0 IT Pro. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780071633567/?ar |zAvailable on O'Reilly for Public Libraries 938 ProQuest Ebook Central|bEBLB|nEBL6258940 938 Askews and Holts Library Services|bASKH|nAH26367929 938 Books 24x7|bB247|nbks00035970 938 ProQuest Ebook Central|bEBLB|nEBL4657893 938 ProQuest Ebook Central|bEBLB|nEBL4668192 938 ebrary|bEBRY|nebr10373316 938 EBSCOhost|bEBSC|n315674 938 YBP Library Services|bYANK|n3200982 994 92|bJFN