Fr. 93.60

The Mobile Application Hacker's Handbook

English · Paperback / Softback

Shipping usually within 3 to 5 weeks (title will be specially ordered)

Description

Read more

See your app through a hacker's eyes to find the real sources of vulnerability
 
The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
 
Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.
* Understand the ways data can be stored, and how cryptography is defeated
* Set up an environment for identifying insecurities and the data leakages that arise
* Develop extensions to bypass security controls and perform injection attacks
* Learn the different attacks that apply specifically to cross-platform apps
 
IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

List of contents

Introduction xxxi
 
Chapter 1 Mobile Application (In)security 1
 
Chapter 2 Analyzing iOS Applications 17
 
Chapter 3 Attacking iOS Applications 69
 
Chapter 4 Identifying iOS Implementation Insecurities 133
 
Chapter 5 Writing Secure iOS Applications 149
 
Chapter 6 Analyzing Android Applications 173
 
Chapter 7 Attacking Android Applications 247
 
Chapter 8 Identifying and Exploiting Android Implementation Issues 353
 
Chapter 9 Writing Secure Android Applications 427
 
Chapter 10 Analyzing Windows Phone Applications 459
 
Chapter 11 Attacking Windows Phone Applications 511
 
Chapter 12 Identifying Windows Phone Implementation Issues 587
 
Chapter 13 Writing Secure Windows Phone Applications 629
 
Chapter 14 Analyzing BlackBerry Applications 647
 
Chapter 15 Attacking BlackBerry Applications 681
 
Chapter 16 Identifying BlackBerry Application Issues 693
 
Chapter 17 Writing Secure BlackBerry Applications 705
 
Chapter 18 Cross?]Platform Mobile Applications 729
 
Index 743

About the author










DOMINIC CHELL is a director of MDSec and a recognized expert in mobile security, providing training to leading global organizations. TYRONE ERASMUS is an expert on Android security and heads Mobile Practice at MWR InfoSecurity SA. SHAUN COLLEY is a security consultant and researcher at IOActive specializing in mobile security and reverse engineering. OLLIE WHITEHOUSE is Technical Director with NCC Group who has previously worked for BlackBerry and Symantec specialising in mobile security.

Summary

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.
* Understand the ways data can be stored, and how cryptography is defeated
* Set up an environment for identifying insecurities and the data leakages that arise
* Develop extensions to bypass security controls and perform injection attacks
* Learn the different attacks that apply specifically to cross-platform apps

IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Report

"..there is a shocking lack of published material on the topic of mobile security. The Mobile Application Hacker's Handbook seeks to change this and be a positive movement to educating others in the topic of mobile security awareness." (Vigilance-Security Magazine, March 2015)

Product details

Authors Chell, Domini Chell, Dominic Chell, Dominic Erasmus Chell, Co, Shaun Colley, Shaun et al Colley, Tyron Erasmus, Tyrone Erasmus, Jon Lindsay, Ollie Whitehouse
Publisher Wiley, John and Sons Ltd
 
Languages English
Product format Paperback / Softback
Released 16.03.2015
 
EAN 9781118958506
ISBN 978-1-118-95850-6
No. of pages 816
Dimensions 187 mm x 235 mm x 35 mm
Subjects Natural sciences, medicine, IT, technology > IT, data processing > Data communication, networks

Informatik, Netzwerk, Netzwerksicherheit, computer science, Networking / Security, Netzwerke / Sicherheit

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.