Related Books
Language: en
Pages: 583
Pages: 583
Type: BOOK - Published: 2014-03-31 - Publisher: John Wiley & Sons
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the sma
Language: en
Pages: 816
Pages: 816
Type: BOOK - Published: 2015-06-11 - Publisher: John Wiley & Sons
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all
Language: en
Pages: 663
Pages: 663
Type: BOOK - Published: 2014-02-26 - Publisher: John Wiley & Sons
Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web
Language: en
Pages: 409
Pages: 409
Type: BOOK - Published: 2012-04-30 - Publisher: John Wiley & Sons
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the
Language: en
Pages: 386
Pages: 386
Type: BOOK - Published: 2011-03-21 - Publisher: John Wiley & Sons
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-