Paperback. Condizione: Very Good. No Jacket. May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Paperback. Condizione: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
EUR 7,96
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Very Good. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
paperback. Condizione: Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
EUR 22,24
Quantità: 2 disponibili
Aggiungi al carrelloCondizione: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
EUR 21,86
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned.
Condizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
EUR 60,71
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 55,02
Quantità: 15 disponibili
Aggiungi al carrelloPAP. Condizione: New. New Book. Shipped from UK. Established seller since 2000.
EUR 63,33
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 58,06
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. In.
EUR 55,01
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New.
EUR 59,68
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: As New. Unread book in perfect condition.
EUR 71,57
Quantità: 3 disponibili
Aggiungi al carrelloCondizione: New. pp. 816.
Da: Kennys Bookshop and Art Galleries Ltd., Galway, GY, Irlanda
Prima edizione
EUR 72,97
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Num Pages: 816 pages, illustrations. BIC Classification: UTN. Category: (P) Professional & Vocational. Dimension: 191 x 239 x 40. Weight in Grams: 1348. . 2015. 1st Edition. Paperback. . . . .
EUR 81,46
Quantità: 1 disponibili
Aggiungi al carrelloCondizione: good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
EUR 91,52
Quantità: Più di 20 disponibili
Aggiungi al carrelloCondizione: New. See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Num Pages: 816 pages, illustrations. BIC Classification: UTN. Category: (P) Professional & Vocational. Dimension: 191 x 239 x 40. Weight in Grams: 1348. . 2015. 1st Edition. Paperback. . . . . Books ship from the US and Ireland.
Condizione: New. pp. 816.
Lingua: Inglese
Editore: John Wiley & Sons Inc, New York, 2015
ISBN 10: 1118958500 ISBN 13: 9781118958506
Da: AussieBookSeller, Truganina, VIC, Australia
Prima edizione
EUR 73,07
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeatedSet up an environment for identifying insecurities and the data leakages that ariseDevelop extensions to bypass security controls and perform injection attacksLearn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide. See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
EUR 89,09
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 1st edition. 816 pages. 9.25x7.25x1.50 inches. In Stock.
Editore: John Wiley & Sons, USA, 2015
Da: Entelechy Books, London, Regno Unito
EUR 35,42
Quantità: 1 disponibili
Aggiungi al carrelloSoft cover. Condizione: As New. The Mobile Application Hacker's Handbook. Dominic Chell, Tyrone Erasmus, Shaun Colley & Ollie Whitehouse. Soft cover publication in as new condition.
EUR 83,16
Quantità: 2 disponibili
Aggiungi al carrelloTaschenbuch. Condizione: Neu. Neuware - See your app through a hacker's eyes to find the real sources of vulnerabilityThe Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.\* Understand the ways data can be stored, and how cryptography is defeated\* Set up an environment for identifying insecurities and the data leakages that arise\* Develop extensions to bypass security controls and perform injection attacks\* Learn the different attacks that apply specifically to cross-platform appsIT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.
Lingua: Inglese
Editore: John Wiley & Sons Inc, New York, 2015
ISBN 10: 1118958500 ISBN 13: 9781118958506
Da: Grand Eagle Retail, Bensenville, IL, U.S.A.
Prima edizione Print on Demand
Paperback. Condizione: new. Paperback. See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeatedSet up an environment for identifying insecurities and the data leakages that ariseDevelop extensions to bypass security controls and perform injection attacksLearn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide. See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. This item is printed on demand. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Da: Revaluation Books, Exeter, Regno Unito
EUR 76,69
Quantità: 2 disponibili
Aggiungi al carrelloPaperback. Condizione: Brand New. 1st edition. 816 pages. 9.25x7.25x1.50 inches. In Stock. This item is printed on demand.
Lingua: Inglese
Editore: John Wiley & Sons Inc, New York, 2015
ISBN 10: 1118958500 ISBN 13: 9781118958506
Da: CitiRetail, Stevenage, Regno Unito
Prima edizione Print on Demand
EUR 64,33
Quantità: 1 disponibili
Aggiungi al carrelloPaperback. Condizione: new. Paperback. See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeatedSet up an environment for identifying insecurities and the data leakages that ariseDevelop extensions to bypass security controls and perform injection attacksLearn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide. See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. This item is printed on demand. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.