Oblasti, naše knjige

Java, JavaScript, JScript, Perl

C++ Visual C++ C#

Apple - MAC OS X

Visual Basic .NET, VBA, V. Studio

Web design

Android

PHP I MYSQL

Python programiranje

WordPress

AutoCad, ArchiCAD, SolidWorks, Catia, Pro/Engineer

Mašinsko učenje

Access

Animacija

Audio, Multimedia, Video

Baze podataka

Cloud

CSS

Delphi

Digitalna fotografija

Django

E-komerc

ECDL

GOOGLE

Grafika, Dizajn, Štampa

Hardver

Internet

Joomla

jQuery

Mreže

MS Office

Obrada teksta

OFFICE 2013

Programiranje

Raspberry PI

Rečnici

Robotika

Sertifikati

SQL Server

Statistika

Tabele

Telekomunikacije

Unix, Linux

Windows

Windows 7

Windows 8

Zaštita i sigurnost

 

Oblasti, drugi izdavači

Alternativna učenja

Antropologija

Arheologija

Arhitektura

Astrologija

Astronomija

Audio kursevi + knjige

Autobiografija

Automobili

Bajke

Biografija

Biološke nauke

Botanika

Dečije knjige

Dizajn

Domaće pripovetke

Domaći roman

Drama

E-knjiga

Ekologija

Ekonomija

Elektrotehnika

Enciklopedija

Esejistika

Etika

Fantastika

Film

Filologija

Filozofija

Fizika

Fotografija

Geografija

Geologija

Građevinarstvo

Hemija

Hidrotehnika

Hobi

Horor

Humor

Intervju

Istorija

Istorija i teorija književnosti

Istorija umetnosti

Istorijski roman

Knjiga posle posla - Beletristika i ostala izdanja

Knjižare i naše knjige

Književna kritika

Kuvari, hrana i piće

Leksikografija

Lingvistika

Ljubavni roman

logo

Magija

Marketing

Mašinstvo

Matematika

Medicina

Memoari

Menadžment

Modeliranje podataka

Monografija

Muzika

Nagrađivanje knjige

Naučna fantastika

OpenOffice.org

Operativni sistemi

Oracle

Organizacione nauke

Pedagogija

Pisci u medijima

Ples

Poezija

Politika

Poljoprivreda

Popularna medicina

Popularna nauka

Popularna psihologija

Posao

Pozorište

Pravo

Pravoslavlje

Primenjene nauke

Pripovetke

Prirodne nauke

Priručnik

Psihologija

Publicistika

Putopis

Religija

Roman

Satira

Saveti

Slikarstvo

Socijalna mreža - Facebook

Sociologija

Sport

Sport i hobi

Strip

Tableti

Tehnologija

Triler

Turizam

Twitter

Udžbenici

Umetnost

Urbanizam

UX DIZAJN

 

Zaštita i sigurnost

 

Mobile Application Penetration Testing

 

Mobile Application Penetration Testing

Autor: Vijay Kumar Velu
Broj strana: 312
ISBN broj: 9781785883378
Izdavač: PACKT PUBLISHING
Godina izdanja: 2016.

Pregleda (30 dana / ukupno): 34 / 726

Predlog za prevod

  • Twitter
  • Facebook
  • Google plus
  • Linkedin
  • Pinterest
  • Email

 

 

What You Will Learn

  • Gain an in-depth understanding of Android and iOS architecture and the latest changes
  • Discover how to work with different tool suites to assess any application
  • Develop different strategies and techniques to connect to a mobile device
  • Create a foundation for mobile application security principles
  • Grasp techniques to attack different components of an Android device and the different functionalities of an iOS device
  • Get to know secure development strategies for both iOS and Android applications
  • Gain an understanding of threat modeling mobile applications
  • Get an in-depth understanding of both Android and iOS implementation vulnerabilities and how to provide counter-measures while developing a mobile app

Book Description

Mobile security has come a long way over the last few years. It has transitioned from "should it be done?" to "it must be done!"Alongside the growing number of devises and applications, there is also a growth in the volume of Personally identifiable information (PII), Financial Data, and much more. This data needs to be secured.

This is why Pen-testing is so important to modern application developers. You need to know how to secure user data, and find vulnerabilities and loopholes in your application that might lead to security breaches.

This book gives you the necessary skills to security test your mobile applications as a beginner, developer, or security practitioner. You'll start by discovering the internal components of an Android and an iOS application. Moving ahead, you'll understand the inter-process working of these applications. Then you'll set up a test environment for this application using various tools to identify the loopholes and vulnerabilities in the structure of the applications. Finally, after collecting all information about these security loop holes, we'll start securing our applications from these threats.

Authors

Vijay Kumar Velu

Vijay Kumar Velu is a passionate information security practitioner, speaker, and blogger, currently working as a cyber security technical manager at one of the Big4 consultancies based in India. He has more than 10 years of IT industry experience, is a licensed penetration tester, and has specialized in providing technical solutions to a variety of cyber problems, ranging from simple security configuration reviews to cyber threat intelligence. Vijay holds multiple security qualifications including Certified Ethical Hacker, EC-council Certified Security Analyst, and Computer Hacking Forensics Investigator. He loves hands-on technological challenges.

Vijay was invited to speak at the National Cyber Security Summit (NCSS), Indian Cyber Conference (InCyCon), Open Cloud Conference, and Ethical Hacking Conference held in India, and he has also delivered multiple guest lectures and training on the importance of information security at various business schools in India. He also recently reviewed Learning Android Forensics, Packt Publishing.

For the information security community, Vijay serves as the director of the Bangalore chapter of the Cloud Security Alliance (CSA) and chair member of the National Cyber Defence and Research Center (NCDRC).

Table of Contents

 

Budite prvi koji će ostaviti komentar.

Ostavite komentar Ostavite komentar

 

Preporučujemo

 

Mastering Kali Linux for Advanced Penetration Testing - Second Edition

1. Mastering Kali Linux for Advanced Penetration Testing - Second Edition

A practical guide to testing your network’s security with Kali Linux, the preferred choice of penetration testers and hackers.

Predlog za prevod

Više o knjizi Više o knjizi

 

CISSP in 21 Days - Second Edition

2. CISSP in 21 Days - Second Edition

Boost your confidence and get the competitive edge you need to crack the exam in just 21 days!

Predlog za prevod

Više o knjizi Više o knjizi

 

Forenzičke istrage mobilnih uređaja: Vodič za sakupljanje, analizu i prezentovanje dokaza

3. Forenzičke istrage mobilnih uređaja: Vodič za sakupljanje, analizu i prezentovanje dokaza

Ovladajte alatima i tehnikama za forenzičke istrage mobilnih uređaja

Predlog za prevod

Više o knjizi Više o knjizi