Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200805 i 4500 
001    864714007 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr cn||||||||| 
008    131205s2013    nyua    ob    001 0 eng   
019    857713646|a865474288|a1084403930|a1249693798 
020    1299826350|q(electronic bk.) 
020    9781299826359|q(electronic bk.) 
020    9780071817028|q(electronic bk.) 
020    0071817026|q(electronic bk.) 
020    |q(paperback) 
020    |q(paperback) 
029 1  AU@|b000052404254 
029 1  AU@|b000053305538 
029 1  DEBSZ|b404324991 
035    (OCoLC)864714007|z(OCoLC)857713646|z(OCoLC)865474288
       |z(OCoLC)1084403930|z(OCoLC)1249693798 
037    513886|bMIL 
037    504CBA64-0756-4CF3-86FC-2C82540E778E|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    NRC|beng|erda|epn|cNRC|dIDEBK|dUMI|dCOO|dB24X7|dOCLCO
       |dDEBBG|dDEBSZ|dVT2|dCDX|dOCLCA|dOCLCO|dYDXCP|dTEFOD
       |dOCLCQ|dOCLCO|dTEFOD|dOCLCQ|dOCLCA|dEBLCP|dOCLCF|dTOH
       |dRDF|dOCLCQ|dD6H|dLIV|dN$T|dOCLCO|dOCLCQ|dOCLCO 
049    INap 
082 04 005.8 
082 04 005.8|223 
099    eBook O'Reilly for Public Libraries 
100 1  Bergman, Neil. 
245 10 Hacking exposed :|bmobile security secrets & solutions /
       |cNeil Bergman, Mike Stanfield, Jason Rouse, Joel 
       Scambray.|h[O'Reilly electronic resource] 
264  1 New York :|bMcGraw-Hill,|c[2013] 
300    1 online resource (xxvii, 289 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
490 1  The secure beginner's guides: security smarts for the self
       -guided IT professional 
500    Includes index. 
504    Includes bibliographical references and index. 
505 0  The Mobile Risk Ecosystem -- Hacking the Cellular Network 
       -- iOS -- Android -- Mobile Malware -- Mobile Services and
       Mobile Web -- Mobile Device Management -- Mobile 
       Development Security -- Mobile Payments -- Consumer 
       Security Checklist -- Security Checklist -- Mobile 
       Application Penetration Testing Toolkit -- iOS Pen Test 
       Toolkit -- Android Pen Test Toolkit. 
520 2  "Proven methodologies, technical rigor, and from-the-
       trenches experience to countering mobile security exploits
       --from the bestselling coauthor of the original Hacking 
       Exposed. Hacking Exposed Mobile focuses on the security of
       applications running on mobile devices, specifically 
       mobile phones. This book focuses on Android OS, as well as
       operating systems from Microsoft and Apple. As businesses 
       rush their mobile products to market and conduct business 
       transactions via mobile devices, vast new security risks, 
       vulnerabilities, and exploits are of great concern. This 
       book addresses all of these issues and provides proven 
       solutions for securing mobile applications. No other book 
       on hacking rivals the original, bulletproof pedagogy of 
       this book's clear-cut Hack/Countermeasure approach. Proven
       strategies for preventing, detecting, and remediating 
       common technology and architecture weaknesses and 
       maintaining tight security controls permanently. 
       Accessible style and format: attacks/countermeasures; risk
       ratings; case studies; self-assessment tips; check lists; 
       and organizational strategies"--|cProvided by publisher 
520 2  "Identify and evade key threats across the expanding 
       mobile risk landscape. Hacking Exposed Mobile : Security 
       Secrets & Solutions covers the wide range of attacks to 
       your mobile deployment alongside ready-to-use 
       countermeasures. Find out how attackers compromise 
       networks and devices, attack mobile services, and subvert 
       mobile apps. Learn how to encrypt mobile data, fortify 
       mobile platforms, and eradicate malware. This cutting-edge
       guide reveals secure mobile development guidelines, how to
       leverage mobile OS features and MDM to isolate apps and 
       data, and the techniques the pros use to secure mobile 
       payment systems"--|cProvided by publisher 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Computer networks|xSecurity measures. 
650  0 Mobile computing|xSecurity measures. 
650  0 Mobile communication systems|xSecurity measures. 
650  0 Hackers. 
650  0 Computer crimes|xPrevention. 
650  6 Réseaux d'ordinateurs|xSécurité|xMesures. 
650  6 Informatique mobile|xSécurité|xMesures. 
650  6 Radiocommunications mobiles|xSécurité|xMesures. 
650  6 Pirates informatiques. 
650  7 Computer crimes|xPrevention|2fast 
650  7 Computer networks|xSecurity measures|2fast 
650  7 Hackers|2fast 
700 1  Stanfield, Mike. 
700 1  Rouse, Jason. 
700 1  Scambray, Joel. 
776 08 |iPrint version:|aBergman, Neil.|tHacking exposed.|dNew 
       York : McGraw-Hill, [2013]|z9780071817011|w(DLC)  
       2013024712|w(OCoLC)820788017 
830  0 Secure beginner's guides. 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9780071817011/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Books 24x7|bB247|nbks00057466 
938    Coutts Information Services|bCOUT|n26088257 
938    ProQuest Ebook Central|bEBLB|nEBL4958413 
938    EBSCOhost|bEBSC|n2686419 
938    ProQuest MyiLibrary Digital eBook Collection|bIDEB
       |ncis26088257 
938    YBP Library Services|bYANK|n12087509 
994    92|bJFN