Exploring screen culture via Apple's mobile devices : life through the looking glass / / Charles Soukup
| Exploring screen culture via Apple's mobile devices : life through the looking glass / / Charles Soukup |
| Autore | Soukup Charles |
| Pubbl/distr/stampa | Lanham, Maryland : , : Lexington Books, , 2016 |
| Descrizione fisica | 1 online resource (133 pages) |
| Disciplina | 302.23/1 |
| Soggetto topico |
Internet - Social aspects
Mobile apps - Social aspects iPhone (Smartphone) - Mobile apps Mass media and culture Mass media - Technological aspects |
| ISBN | 1-4985-3961-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Surveying the looking glass life -- Relevance processing in 21st century screen culture -- Postmodern ethnography of everyday life -- iOS as a cognitive map within hyper-mediated culture -- Apps as gamification in everyday life -- Mobile applications as equipment for living in a hyper-mediated culture of technique. |
| Record Nr. | UNINA-9910792658203321 |
Soukup Charles
|
||
| Lanham, Maryland : , : Lexington Books, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Exploring screen culture via Apple's mobile devices : life through the looking glass / / Charles Soukup
| Exploring screen culture via Apple's mobile devices : life through the looking glass / / Charles Soukup |
| Autore | Soukup Charles |
| Pubbl/distr/stampa | Lanham, Maryland : , : Lexington Books, , 2016 |
| Descrizione fisica | 1 online resource (133 pages) |
| Disciplina | 302.23/1 |
| Soggetto topico |
Internet - Social aspects
Mobile apps - Social aspects iPhone (Smartphone) - Mobile apps Mass media and culture Mass media - Technological aspects |
| ISBN | 1-4985-3961-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Surveying the looking glass life -- Relevance processing in 21st century screen culture -- Postmodern ethnography of everyday life -- iOS as a cognitive map within hyper-mediated culture -- Apps as gamification in everyday life -- Mobile applications as equipment for living in a hyper-mediated culture of technique. |
| Record Nr. | UNINA-9910817442203321 |
Soukup Charles
|
||
| Lanham, Maryland : , : Lexington Books, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
iPhone 5 for dummies / / by Edward C. Baig and Bob LeVitus
| iPhone 5 for dummies / / by Edward C. Baig and Bob LeVitus |
| Autore | Baig Edward C |
| Pubbl/distr/stampa | For Dummies |
| Disciplina | 004.167 |
| Altri autori (Persone) | LeVitusBob |
| Soggetto topico |
iPhone (Smartphone)
iPhone (Smartphone) - Mobile apps |
| ISBN | 1-118-55269-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910154935903321 |
Baig Edward C
|
||
| For Dummies | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The mobile application hacker's handbook / / Dominic Chell [and three others]
| The mobile application hacker's handbook / / Dominic Chell [and three others] |
| Autore | Chell Dominic |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indiapolis, Indiana : , : Wiley, , 2015 |
| Descrizione fisica | 1 online resource (1564 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
iPhone (Smartphone) - Security measures
iPhone (Smartphone) - Mobile apps Android (Electronic resource) - Security measures |
| ISBN |
1-118-95852-7
1-118-95851-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Introduction; Overview of This Book; How This Book Is Organized; Who Should Read This Book; Tools You Will Need; What's on the Website; Chapter 1 Mobile Application (In)security; The Evolution of Mobile Applications; Mobile Application Security; Summary; Chapter 2 Analyzing iOS Applications; Understanding the Security Model; Understanding iOS Applications; Jailbreaking Explained; Understanding the Data Protection API; Understanding the iOS Keychain; Understanding Touch ID; Reverse Engineering iOS Binaries; Summary; Chapter 3 Attacking iOS Applications
Introduction to Transport Security Identifying Insecure Storage; Patching iOS Applications with Hopper; Attacking the iOS Runtime; Understanding Interprocess Communication; Attacking Using Injection; Summary; Chapter 4 Identifying iOS Implementation Insecurities; Disclosing Personally Identifiable Information; Identifying Data Leaks; Memory Corruption in iOS Applications; Summary; Chapter 5 Writing Secure iOS Applications; Protecting Data in Your Application; Avoiding Injection Vulnerabilities; Securing Your Application with Binary Protections; Summary; Chapter 6 Analyzing Android Applications Creating Your First Android Environment Understanding Android Applications; Understanding the Security Model; Reverse-Engineering Applications; Summary; Chapter 7 Attacking Android Applications; Exposing Security Model Quirks; Attacking Application Components; Accessing Storage and Logging; Misusing Insecure Communications; Exploiting Other Vectors; Additional Testing Techniques; Summary; Chapter 8 Identifying and Exploiting Android Implementation Issues; Reviewing Pre-Installed Applications; Exploiting Devices; Infiltrating User Data; Summary; Chapter 9 Writing Secure Android Applications Principle of Least Exposure Essential Security Mechanisms; Advanced Security Mechanisms; Slowing Down a Reverse Engineer; Summary; Chapter 10 Analyzing Windows Phone Applications; Understanding the Security Model; Understanding Windows Phone 8.x Applications; Building a Test Environment; Analyzing Application Binaries; Summary; Chapter 11 Attacking Windows Phone Applications; Analyzing for Data Entry Points; Attacking Transport Security; Attacking WebBrowser and WebView Controls; Identifying Interprocess Communication Vulnerabilities; Attacking XML Parsing; Attacking Databases Attacking File Handling Patching .NET Assemblies; Summary; Chapter 12 Identifying Windows Phone Implementation Issues; Identifying Insecure Application Settings Storage; Identifying Data Leaks; Identifying Insecure Data Storage; Insecure Random Number Generation; Insecure Cryptography and Password Use; Identifying Native Code Vulnerabilities; Summary; Chapter 13 Writing Secure Windows Phone Applications; General Security Design Considerations; Storing and Encrypting Data Securely; Secure Random Number Generation; Securing Data in Memory and Wiping Memory; Avoiding SQLite Injection Implementing Secure Communications |
| Record Nr. | UNINA-9910132442003321 |
Chell Dominic
|
||
| Indiapolis, Indiana : , : Wiley, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The mobile application hacker's handbook / / Dominic Chell [and three others]
| The mobile application hacker's handbook / / Dominic Chell [and three others] |
| Autore | Chell Dominic |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indiapolis, Indiana : , : Wiley, , 2015 |
| Descrizione fisica | 1 online resource (1564 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
iPhone (Smartphone) - Security measures
iPhone (Smartphone) - Mobile apps Android (Electronic resource) - Security measures |
| ISBN |
1-118-95852-7
1-118-95851-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Introduction; Overview of This Book; How This Book Is Organized; Who Should Read This Book; Tools You Will Need; What's on the Website; Chapter 1 Mobile Application (In)security; The Evolution of Mobile Applications; Mobile Application Security; Summary; Chapter 2 Analyzing iOS Applications; Understanding the Security Model; Understanding iOS Applications; Jailbreaking Explained; Understanding the Data Protection API; Understanding the iOS Keychain; Understanding Touch ID; Reverse Engineering iOS Binaries; Summary; Chapter 3 Attacking iOS Applications
Introduction to Transport Security Identifying Insecure Storage; Patching iOS Applications with Hopper; Attacking the iOS Runtime; Understanding Interprocess Communication; Attacking Using Injection; Summary; Chapter 4 Identifying iOS Implementation Insecurities; Disclosing Personally Identifiable Information; Identifying Data Leaks; Memory Corruption in iOS Applications; Summary; Chapter 5 Writing Secure iOS Applications; Protecting Data in Your Application; Avoiding Injection Vulnerabilities; Securing Your Application with Binary Protections; Summary; Chapter 6 Analyzing Android Applications Creating Your First Android Environment Understanding Android Applications; Understanding the Security Model; Reverse-Engineering Applications; Summary; Chapter 7 Attacking Android Applications; Exposing Security Model Quirks; Attacking Application Components; Accessing Storage and Logging; Misusing Insecure Communications; Exploiting Other Vectors; Additional Testing Techniques; Summary; Chapter 8 Identifying and Exploiting Android Implementation Issues; Reviewing Pre-Installed Applications; Exploiting Devices; Infiltrating User Data; Summary; Chapter 9 Writing Secure Android Applications Principle of Least Exposure Essential Security Mechanisms; Advanced Security Mechanisms; Slowing Down a Reverse Engineer; Summary; Chapter 10 Analyzing Windows Phone Applications; Understanding the Security Model; Understanding Windows Phone 8.x Applications; Building a Test Environment; Analyzing Application Binaries; Summary; Chapter 11 Attacking Windows Phone Applications; Analyzing for Data Entry Points; Attacking Transport Security; Attacking WebBrowser and WebView Controls; Identifying Interprocess Communication Vulnerabilities; Attacking XML Parsing; Attacking Databases Attacking File Handling Patching .NET Assemblies; Summary; Chapter 12 Identifying Windows Phone Implementation Issues; Identifying Insecure Application Settings Storage; Identifying Data Leaks; Identifying Insecure Data Storage; Insecure Random Number Generation; Insecure Cryptography and Password Use; Identifying Native Code Vulnerabilities; Summary; Chapter 13 Writing Secure Windows Phone Applications; General Security Design Considerations; Storing and Encrypting Data Securely; Secure Random Number Generation; Securing Data in Memory and Wiping Memory; Avoiding SQLite Injection Implementing Secure Communications |
| Record Nr. | UNINA-9910827570103321 |
Chell Dominic
|
||
| Indiapolis, Indiana : , : Wiley, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Swift 3 game development : embrace the mobile gaming revolution by creating popular iOS games with Swift 3.0 / / Stephen Haney
| Swift 3 game development : embrace the mobile gaming revolution by creating popular iOS games with Swift 3.0 / / Stephen Haney |
| Autore | Haney Stephen |
| Edizione | [Second edition.] |
| Pubbl/distr/stampa | Birmingham, England ; ; Mumbai, [India] : , : Packt, , 2017 |
| Descrizione fisica | 1 online resource (251 pages) : illustrations |
| Disciplina | 794.81526 |
| Soggetto topico |
Video games - Programming
Swift (Computer program language) iPhone (Smartphone) - Mobile apps |
| ISBN | 1-78712-242-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910164039503321 |
Haney Stephen
|
||
| Birmingham, England ; ; Mumbai, [India] : , : Packt, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||