- Регистрация
- 27 Авг 2018
- Сообщения
- 37,878
- Реакции
- 548,801
- Тема Автор Вы автор данного материала? |
- #1
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Secure today's mobile devices and applications
Implement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource.
- Design highly isolated, secure, and authenticated mobile applications
- Use the Google Android emulator, debugger, and third-party security tools
- Configure Apple iPhone APIs to prevent overflow and SQL injection attacks
- Employ private and public key cryptography on Windows Mobile devices
- Enforce fine-grained security policies using the BlackBerry Enterprise Server
- Plug holes in Java Mobile Edition, SymbianOS, and WebOS applications
- Test for XSS, CSRF, HTTP redirects, and phishing attacks on WAP/Mobile HTML applications
- Identify and eliminate threats from Bluetooth, SMS, and GPS services
DOWNLOAD: