LEADER 00000cam a2200805 i 4500 001 864714007 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cn||||||||| 008 131205s2013 nyua ob 001 0 eng 019 857713646|a865474288|a1084403930|a1249693798 020 1299826350|q(electronic bk.) 020 9781299826359|q(electronic bk.) 020 9780071817028|q(electronic bk.) 020 0071817026|q(electronic bk.) 020 |q(paperback) 020 |q(paperback) 029 1 AU@|b000052404254 029 1 AU@|b000053305538 029 1 DEBSZ|b404324991 035 (OCoLC)864714007|z(OCoLC)857713646|z(OCoLC)865474288 |z(OCoLC)1084403930|z(OCoLC)1249693798 037 513886|bMIL 037 504CBA64-0756-4CF3-86FC-2C82540E778E|bOverDrive, Inc. |nhttp://www.overdrive.com 040 NRC|beng|erda|epn|cNRC|dIDEBK|dUMI|dCOO|dB24X7|dOCLCO |dDEBBG|dDEBSZ|dVT2|dCDX|dOCLCA|dOCLCO|dYDXCP|dTEFOD |dOCLCQ|dOCLCO|dTEFOD|dOCLCQ|dOCLCA|dEBLCP|dOCLCF|dTOH |dRDF|dOCLCQ|dD6H|dLIV|dN$T|dOCLCO|dOCLCQ|dOCLCO 049 INap 082 04 005.8 082 04 005.8|223 099 eBook O'Reilly for Public Libraries 100 1 Bergman, Neil. 245 10 Hacking exposed :|bmobile security secrets & solutions / |cNeil Bergman, Mike Stanfield, Jason Rouse, Joel Scambray.|h[O'Reilly electronic resource] 264 1 New York :|bMcGraw-Hill,|c[2013] 300 1 online resource (xxvii, 289 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 490 1 The secure beginner's guides: security smarts for the self -guided IT professional 500 Includes index. 504 Includes bibliographical references and index. 505 0 The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit. 520 2 "Proven methodologies, technical rigor, and from-the- trenches experience to countering mobile security exploits --from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"--|cProvided by publisher 520 2 "Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"--|cProvided by publisher 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Computer networks|xSecurity measures. 650 0 Mobile computing|xSecurity measures. 650 0 Mobile communication systems|xSecurity measures. 650 0 Hackers. 650 0 Computer crimes|xPrevention. 650 6 Réseaux d'ordinateurs|xSécurité|xMesures. 650 6 Informatique mobile|xSécurité|xMesures. 650 6 Radiocommunications mobiles|xSécurité|xMesures. 650 6 Pirates informatiques. 650 7 Computer crimes|xPrevention|2fast 650 7 Computer networks|xSecurity measures|2fast 650 7 Hackers|2fast 700 1 Stanfield, Mike. 700 1 Rouse, Jason. 700 1 Scambray, Joel. 776 08 |iPrint version:|aBergman, Neil.|tHacking exposed.|dNew York : McGraw-Hill, [2013]|z9780071817011|w(DLC) 2013024712|w(OCoLC)820788017 830 0 Secure beginner's guides. 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9780071817011/?ar |zAvailable on O'Reilly for Public Libraries 938 Books 24x7|bB247|nbks00057466 938 Coutts Information Services|bCOUT|n26088257 938 ProQuest Ebook Central|bEBLB|nEBL4958413 938 EBSCOhost|bEBSC|n2686419 938 ProQuest MyiLibrary Digital eBook Collection|bIDEB |ncis26088257 938 YBP Library Services|bYANK|n12087509 994 92|bJFN