MARC details
000 -LEADER |
fixed length control field |
02931nam a2200241Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250520100654.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9780071817011 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK 5105.59 .B47 2013 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Bergman, Neil |
Relator term |
author |
245 #0 - TITLE STATEMENT |
Title |
Hacking exposed : |
Remainder of title |
mobile security secrets and solutions / |
Statement of responsibility, etc. |
Neil Bergman [and three others] |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York : |
Name of publisher, distributor, etc. |
McGraw Hill Education, |
Date of publication, distribution, etc. |
c2013 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvii, 289 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
PHP2499 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
The Mobile Risk Ecosystem -- Hacking the Cellular Network -- iOS -- Android -- Mobile Malware -- Mobile Services and Mobile Web -- Mobile Device Management -- Mobile Development Security -- Mobile Payments -- Consumer Security Checklist -- Security Checklist -- Mobile Application Penetration Testing Toolkit -- iOS Pen Test Toolkit -- Android Pen Test Toolkit. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits--from the bestselling coauthor of the original Hacking Exposed. Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This book focuses on Android OS, as well as operating systems from Microsoft and Apple. As businesses rush their mobile products to market and conduct business transactions via mobile devices, vast new security risks, vulnerabilities, and exploits are of great concern. This book addresses all of these issues and provides proven solutions for securing mobile applications. No other book on hacking rivals the original, bulletproof pedagogy of this book's clear-cut Hack/Countermeasure approach. Proven strategies for preventing, detecting, and remediating common technology and architecture weaknesses and maintaining tight security controls permanently. Accessible style and format: attacks/countermeasures; risk ratings; case studies; self-assessment tips; check lists; and organizational strategies"-- Provided by publisher. "Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure mobile development guidelines, how to leverage mobile OS features and MDM to isolate apps and data, and the techniques the pros use to secure mobile payment systems"-- Provided by publisher. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER NETWORKS -- SECURITY MEASURES |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Stanfield, Mike ;Rouse, Jason;Scambray, Joel |
Relator term |
co-author;co-author;co-author |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
Books |