The Mobile Application Hacker's Handbook
eBook - PDF

The Mobile Application Hacker's Handbook

Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse

  1. English
  2. PDF
  3. Available on iOS & Android
eBook - PDF

The Mobile Application Hacker's Handbook

Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse

Book details
Table of contents
Citations

About This Book

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.

Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data.

  • Understand the ways data can be stored, and how cryptography is defeated
  • Set up an environment for identifying insecurities and the data leakages that arise
  • Develop extensions to bypass security controls and perform injection attacks
  • Learn the different attacks that apply specifically to cross-platform apps

IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access The Mobile Application Hacker's Handbook by Dominic Chell, Tyrone Erasmus, Shaun Colley, Ollie Whitehouse in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Wiley
Year
2015
ISBN
9781118958520
Edition
1

Table of contents

  1. The Mobile Application Hacker’s Handbook
  2. Contents
  3. Introduction
  4. Chapter 1 Mobile Application (In)security
  5. Chapter 2 Analyzing iOS Applications
  6. Chapter 3 Attacking iOS Applications
  7. Chapter 4 Identifying iOS Implementation Insecurities
  8. Chapter 5 Writing Secure iOS Applications
  9. Chapter 6 Analyzing Android Applications
  10. Chapter 7 Attacking Android Applications
  11. Chapter 8 Identifying and Exploiting Android Implementation Issues
  12. Chapter 9 Writing Secure Android Applications
  13. Chapter 10 Analyzing Windows Phone Applications
  14. Chapter 11 Attacking Windows Phone Applications
  15. Chapter 12 Identifying Windows Phone Implementation Issues
  16. Chapter 13 Writing Secure Windows Phone Applications
  17. Chapter 14 Analyzing BlackBerry Applications
  18. Chapter 15 Attacking BlackBerry Applications
  19. Chapter 16 Identifying BlackBerry Application Issues
  20. Chapter 17 Writing Secure BlackBerry Applications
  21. Chapter 18 Cross-Platform Mobile Applications
  22. Index
  23. EULA