Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
-23% $48.59$48.59
Ships from: Amazon.com Sold by: Amazon.com
$32.20$32.20
FREE delivery Monday, May 20
Ships from: -Bookworm- Sold by: -Bookworm-
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
OK
The Mobile Application Hacker's Handbook Illustrated Edition
Purchase options and add-ons
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.
- Understand the ways data can be stored, and how cryptography is defeated
- Set up an environment for identifying insecurities and the data leakages that arise
- Develop extensions to bypass security controls and perform injection attacks
- Learn the different attacks that apply specifically to cross-platform apps
IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.
- ISBN-101118958500
- ISBN-13978-1118958506
- EditionIllustrated
- PublisherWiley
- Publication dateFebruary 13, 2015
- LanguageEnglish
- Dimensions7.38 x 1.84 x 9.25 inches
- Print length816 pages
Frequently bought together
Similar items that may deliver to you quickly
Editorial Reviews
Review
"..there is a shocking lack of published material on the topic of mobile security. The Mobile Application Hacker's Handbook seeks to change this and be a positive movement to educating others in the topic of mobile security awareness." (Vigilance-Security Magazine, March 2015)
From the Inside Flap
View your app through a hacker's eyes
IT security breaches make headlines almost daily. With both personal and corporate information being carried in so many pockets, mobile applications on the iOS, Android, Blackberry, and Windows Phones are a fertile field for hackers. To discover the true vulnerabilities in a mobile app, you must look at it as a hacker does.
This practical guide focuses relentlessly on the hacker's approach, helping you secure mobile apps by demonstrating how hackers exploit weak points and flaws to gain access to data. Discover a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt, and remediate the various types of attacks.
Learn to:
- Understand the ways data can be stored and how hackers can defeat cryptography
- Set up an environment in which insecurities and data leakages can be identified
- Develop extensions to bypass security controls and perform injection attacks for testing
- Identify the different types of attacks that apply specifically to cross-platform apps
- Recognize how hackers bypass security controls such as jailbreak/root detection, tamper detection, runtime protection, and anti-debugging
- Implement a generic methodology for mobile application testing
From the Back Cover
View your app through a hacker's eyes
IT security breaches make headlines almost daily. With both personal and corporate information being carried in so many pockets, mobile applications on the iOS, Android, Blackberry, and Windows Phones are a fertile field for hackers. To discover the true vulnerabilities in a mobile app, you must look at it as a hacker does.
This practical guide focuses relentlessly on the hacker's approach, helping you secure mobile apps by demonstrating how hackers exploit weak points and flaws to gain access to data. Discover a proven methodology for approaching mobile application assessments and the techniques used to prevent, disrupt, and remediate the various types of attacks.
Learn to:
- Understand the ways data can be stored and how hackers can defeat cryptography
- Set up an environment in which insecurities and data leakages can be identified
- Develop extensions to bypass security controls and perform injection attacks for testing
- Identify the different types of attacks that apply specifically to cross-platform apps
- Recognize how hackers bypass security controls such as jailbreak/root detection, tamper detection, runtime protection, and anti-debugging
- Implement a generic methodology for mobile application testing
About the Author
DOMINIC CHELL is a director of MDSec and a recognized expert in mobile security, providing training to leading global organizations.
TYRONE ERASMUS is an expert on Android security and heads Mobile Practice at MWR InfoSecurity SA.
SHAUN COLLEY is a security consultant and researcher at IOActive specializing in mobile security and reverse engineering.
OLLIE WHITEHOUSE is Technical Director with NCC Group who has previously worked for BlackBerry and Symantec specialising in mobile security.
Product details
- Publisher : Wiley; Illustrated edition (February 13, 2015)
- Language : English
- Paperback : 816 pages
- ISBN-10 : 1118958500
- ISBN-13 : 978-1118958506
- Item Weight : 3.1 pounds
- Dimensions : 7.38 x 1.84 x 9.25 inches
- Best Sellers Rank: #465,114 in Books (See Top 100 in Books)
- #331 in Computer Hacking
- #950 in Computer Science (Books)
- #14,372 in Unknown
- Customer Reviews:
About the authors
Discover more of the author’s books, see similar authors, read author blogs and more
Discover more of the author’s books, see similar authors, read author blogs and more
Discover more of the author’s books, see similar authors, read author blogs and more
Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on Amazon-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
Full disclosure: I have not read the Windows Mobile or Blackberry sections.