top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
The mobile application hacker's handbook / / Dominic Chell [and three others]
The mobile application hacker's handbook / / Dominic Chell [and three others]
Autore Chell Dominic
Edizione [1st edition]
Pubbl/distr/stampa Indiapolis, Indiana : , : Wiley, , 2015
Descrizione fisica 1 online resource (1564 p.)
Disciplina 005.8
Soggetto topico iPhone (Smartphone) - Security measures
iPhone (Smartphone) - Mobile apps
Android (Electronic resource) - Security measures
ISBN 1-118-95852-7
1-118-95851-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Introduction; Overview of This Book; How This Book Is Organized; Who Should Read This Book; Tools You Will Need; What's on the Website; Chapter 1 Mobile Application (In)security; The Evolution of Mobile Applications; Mobile Application Security; Summary; Chapter 2 Analyzing iOS Applications; Understanding the Security Model; Understanding iOS Applications; Jailbreaking Explained; Understanding the Data Protection API; Understanding the iOS Keychain; Understanding Touch ID; Reverse Engineering iOS Binaries; Summary; Chapter 3 Attacking iOS Applications
Introduction to Transport Security Identifying Insecure Storage; Patching iOS Applications with Hopper; Attacking the iOS Runtime; Understanding Interprocess Communication; Attacking Using Injection; Summary; Chapter 4 Identifying iOS Implementation Insecurities; Disclosing Personally Identifiable Information; Identifying Data Leaks; Memory Corruption in iOS Applications; Summary; Chapter 5 Writing Secure iOS Applications; Protecting Data in Your Application; Avoiding Injection Vulnerabilities; Securing Your Application with Binary Protections; Summary; Chapter 6 Analyzing Android Applications
Creating Your First Android Environment Understanding Android Applications; Understanding the Security Model; Reverse-Engineering Applications; Summary; Chapter 7 Attacking Android Applications; Exposing Security Model Quirks; Attacking Application Components; Accessing Storage and Logging; Misusing Insecure Communications; Exploiting Other Vectors; Additional Testing Techniques; Summary; Chapter 8 Identifying and Exploiting Android Implementation Issues; Reviewing Pre-Installed Applications; Exploiting Devices; Infiltrating User Data; Summary; Chapter 9 Writing Secure Android Applications
Principle of Least Exposure Essential Security Mechanisms; Advanced Security Mechanisms; Slowing Down a Reverse Engineer; Summary; Chapter 10 Analyzing Windows Phone Applications; Understanding the Security Model; Understanding Windows Phone 8.x Applications; Building a Test Environment; Analyzing Application Binaries; Summary; Chapter 11 Attacking Windows Phone Applications; Analyzing for Data Entry Points; Attacking Transport Security; Attacking WebBrowser and WebView Controls; Identifying Interprocess Communication Vulnerabilities; Attacking XML Parsing; Attacking Databases
Attacking File Handling Patching .NET Assemblies; Summary; Chapter 12 Identifying Windows Phone Implementation Issues; Identifying Insecure Application Settings Storage; Identifying Data Leaks; Identifying Insecure Data Storage; Insecure Random Number Generation; Insecure Cryptography and Password Use; Identifying Native Code Vulnerabilities; Summary; Chapter 13 Writing Secure Windows Phone Applications; General Security Design Considerations; Storing and Encrypting Data Securely; Secure Random Number Generation; Securing Data in Memory and Wiping Memory; Avoiding SQLite Injection
Implementing Secure Communications
Record Nr. UNINA-9910132442003321
Chell Dominic  
Indiapolis, Indiana : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The mobile application hacker's handbook / / Dominic Chell [and three others]
The mobile application hacker's handbook / / Dominic Chell [and three others]
Autore Chell Dominic
Edizione [1st edition]
Pubbl/distr/stampa Indiapolis, Indiana : , : Wiley, , 2015
Descrizione fisica 1 online resource (1564 p.)
Disciplina 005.8
Soggetto topico iPhone (Smartphone) - Security measures
iPhone (Smartphone) - Mobile apps
Android (Electronic resource) - Security measures
ISBN 1-118-95852-7
1-118-95851-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Introduction; Overview of This Book; How This Book Is Organized; Who Should Read This Book; Tools You Will Need; What's on the Website; Chapter 1 Mobile Application (In)security; The Evolution of Mobile Applications; Mobile Application Security; Summary; Chapter 2 Analyzing iOS Applications; Understanding the Security Model; Understanding iOS Applications; Jailbreaking Explained; Understanding the Data Protection API; Understanding the iOS Keychain; Understanding Touch ID; Reverse Engineering iOS Binaries; Summary; Chapter 3 Attacking iOS Applications
Introduction to Transport Security Identifying Insecure Storage; Patching iOS Applications with Hopper; Attacking the iOS Runtime; Understanding Interprocess Communication; Attacking Using Injection; Summary; Chapter 4 Identifying iOS Implementation Insecurities; Disclosing Personally Identifiable Information; Identifying Data Leaks; Memory Corruption in iOS Applications; Summary; Chapter 5 Writing Secure iOS Applications; Protecting Data in Your Application; Avoiding Injection Vulnerabilities; Securing Your Application with Binary Protections; Summary; Chapter 6 Analyzing Android Applications
Creating Your First Android Environment Understanding Android Applications; Understanding the Security Model; Reverse-Engineering Applications; Summary; Chapter 7 Attacking Android Applications; Exposing Security Model Quirks; Attacking Application Components; Accessing Storage and Logging; Misusing Insecure Communications; Exploiting Other Vectors; Additional Testing Techniques; Summary; Chapter 8 Identifying and Exploiting Android Implementation Issues; Reviewing Pre-Installed Applications; Exploiting Devices; Infiltrating User Data; Summary; Chapter 9 Writing Secure Android Applications
Principle of Least Exposure Essential Security Mechanisms; Advanced Security Mechanisms; Slowing Down a Reverse Engineer; Summary; Chapter 10 Analyzing Windows Phone Applications; Understanding the Security Model; Understanding Windows Phone 8.x Applications; Building a Test Environment; Analyzing Application Binaries; Summary; Chapter 11 Attacking Windows Phone Applications; Analyzing for Data Entry Points; Attacking Transport Security; Attacking WebBrowser and WebView Controls; Identifying Interprocess Communication Vulnerabilities; Attacking XML Parsing; Attacking Databases
Attacking File Handling Patching .NET Assemblies; Summary; Chapter 12 Identifying Windows Phone Implementation Issues; Identifying Insecure Application Settings Storage; Identifying Data Leaks; Identifying Insecure Data Storage; Insecure Random Number Generation; Insecure Cryptography and Password Use; Identifying Native Code Vulnerabilities; Summary; Chapter 13 Writing Secure Windows Phone Applications; General Security Design Considerations; Storing and Encrypting Data Securely; Secure Random Number Generation; Securing Data in Memory and Wiping Memory; Avoiding SQLite Injection
Implementing Secure Communications
Record Nr. UNINA-9910827570103321
Chell Dominic  
Indiapolis, Indiana : , : Wiley, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui