02357nam 2200397 450 991013832800332120230226013220.0(CKB)3230000000018174(NjHacI)993230000000018174(EXLCZ)99323000000001817420230226d2006 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierAlternative Measures of Well-Being /Romina Boarini, Asa Johansson, Marco Mira d'ErcoleParis :OECD,2006.©20061 online resource (58 pages) color illustrationsOECD social, employment, and migration working papers, ;No. 33Includes bibliographical references.All discussions about the desirability of policy reforms rest on judgements about their effects on individuals and societal well-being. Yet, suitable measures for assessing how well-being is changing over time or compares across countries are lacking. This problem is, of course, not new and standard economic theory has provided, over the years, a range of insights about the criteria and domains that are most critical for the measurement of well-being, and on the relation between well-being and measures of economic resources. This paper does not revisit this theoretical discussion, nor does it provide a comprehensive review of different approaches to the measurement of well-being. It rather assesses whether GDP per capita is an adequate proxy as a measure of well-being or whether other indicators - used either as substitutes or as complements to GDP per capita - are more suitable for that purpose. Attention is limited to only some of the factors that influence well-being, and excludes some critical elements such as the environment, home production and other non-market factors.OECD social, employment, and migration working papers ;No. 33.Economic indicatorsEconomic indicators.330.015195Boarini Romina1287172Johansson ÅsaMira D'Ercole MarcoNjHacINjHaclDOCUMENT9910138328003321Alternative Measures of Well-Being3020070UNINA05515nam 2200697 450 991082757010332120200520144314.01-118-95852-71-118-95851-9(CKB)3710000000361270(EBL)1895167(SSID)ssj0001539424(PQKBManifestationID)11936591(PQKBTitleCode)TC0001539424(PQKBWorkID)11531661(PQKB)11435857(Au-PeEL)EBL1895167(CaPaEBR)ebr11069570(CaONFJC)MIL802202(PPN)234893702(OCoLC)904405106(CaSebORM)9781118958513(MiAaPQ)EBC1895167(EXLCZ)99371000000036127020150714h20152015 uy 0engurunu|||||txtccrThe mobile application hacker's handbook /Dominic Chell [and three others]1st editionIndiapolis, Indiana :Wiley,2015.©20151 online resource (1564 p.)Includes index.1-119-18365-0 1-118-95850-0 Cover; Introduction; Overview of This Book; How This Book Is Organized; Who Should Read This Book; Tools You Will Need; What's on the Website; Chapter 1 Mobile Application (In)security; The Evolution of Mobile Applications; Mobile Application Security; Summary; Chapter 2 Analyzing iOS Applications; Understanding the Security Model; Understanding iOS Applications; Jailbreaking Explained; Understanding the Data Protection API; Understanding the iOS Keychain; Understanding Touch ID; Reverse Engineering iOS Binaries; Summary; Chapter 3 Attacking iOS ApplicationsIntroduction to Transport Security Identifying Insecure Storage; Patching iOS Applications with Hopper; Attacking the iOS Runtime; Understanding Interprocess Communication; Attacking Using Injection; Summary; Chapter 4 Identifying iOS Implementation Insecurities; Disclosing Personally Identifiable Information; Identifying Data Leaks; Memory Corruption in iOS Applications; Summary; Chapter 5 Writing Secure iOS Applications; Protecting Data in Your Application; Avoiding Injection Vulnerabilities; Securing Your Application with Binary Protections; Summary; Chapter 6 Analyzing Android ApplicationsCreating Your First Android Environment Understanding Android Applications; Understanding the Security Model; Reverse-Engineering Applications; Summary; Chapter 7 Attacking Android Applications; Exposing Security Model Quirks; Attacking Application Components; Accessing Storage and Logging; Misusing Insecure Communications; Exploiting Other Vectors; Additional Testing Techniques; Summary; Chapter 8 Identifying and Exploiting Android Implementation Issues; Reviewing Pre-Installed Applications; Exploiting Devices; Infiltrating User Data; Summary; Chapter 9 Writing Secure Android ApplicationsPrinciple of Least Exposure Essential Security Mechanisms; Advanced Security Mechanisms; Slowing Down a Reverse Engineer; Summary; Chapter 10 Analyzing Windows Phone Applications; Understanding the Security Model; Understanding Windows Phone 8.x Applications; Building a Test Environment; Analyzing Application Binaries; Summary; Chapter 11 Attacking Windows Phone Applications; Analyzing for Data Entry Points; Attacking Transport Security; Attacking WebBrowser and WebView Controls; Identifying Interprocess Communication Vulnerabilities; Attacking XML Parsing; Attacking DatabasesAttacking File Handling Patching .NET Assemblies; Summary; Chapter 12 Identifying Windows Phone Implementation Issues; Identifying Insecure Application Settings Storage; Identifying Data Leaks; Identifying Insecure Data Storage; Insecure Random Number Generation; Insecure Cryptography and Password Use; Identifying Native Code Vulnerabilities; Summary; Chapter 13 Writing Secure Windows Phone Applications; General Security Design Considerations; Storing and Encrypting Data Securely; Secure Random Number Generation; Securing Data in Memory and Wiping Memory; Avoiding SQLite InjectionImplementing Secure CommunicationsSee your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. CoverageiPhone (Smartphone)Security measuresiPhone (Smartphone)Mobile appsAndroid (Electronic resource)Security measuresiPhone (Smartphone)Security measures.iPhone (Smartphone)Mobile apps.Android (Electronic resource)Security measures.005.8Chell Dominic1703157Chell DominicMiAaPQMiAaPQMiAaPQBOOK9910827570103321The mobile application hacker's handbook4088151UNINA