Note: Not guaranteed to come with supplemental materials (access cards, study guides, lab manuals, CDs, etc.)
Extend Your Rental at Any Time
Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.
Sorry, this item is currently unavailable.
Secure today's mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices,Mobile Application Securitydetails how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource. Design highly isolated, secure, and authenticated mobile applications Use the Google Android emulator, debugger, and third-party security tools Configure Apple iPhone APIs to prevent overflow and SQL injection attacks Employ private and public key cryptography on Windows Mobile devices Enforce fine-grained security policies using the BlackBerry Enterprise Server Plug holes in Java Mobile Edition, SymbianOS, and WebOS applications Test for XSS, CSRF, HTTP redirects, and phishing attacks on WAP/Mobile HTML applications Identify and eliminate threats from Bluetooth, SMS, and GPS servicesHimanshu Dwivediis a co-founder of iSEC Partners (www.isecpartners.com), an information security firm specializing in application security.Chris Clarkis a principal security consultant with iSEC Partners.David Thielis a principal security consultant with iSEC Partners.
Himanshu Dwivedi is a founding partner of iSEC Partners, an information security organization. He is a co-author of Hacking Exposed: Web 2.0 and several other books.