Attacks take place everyday with computers connected to the internet, because of worms, viruses or due to vulnerable software. T...
This book describes how software code analysis tools such as IDA Pro are used to disassemble programs written in high-level lang...
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Andro...
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabi...
- Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily...
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android pl...
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually...
This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrator...
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everyth...
Mobile devices, such as smartphones, have achieved computing and networking capabilities comparable to traditional personal comp...
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provid...
This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are l...
This essential book for all software developers~~regardless of platform, language, or type of application~~outlines the “19 dead...
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act qu...
This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discu...