#webscene

#The biggest in small world

Tutorials published by nimaarek

Decompiling Android

# Decompiling Android

Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to An...

Android Malware

# Android Malware

Mobile devices, such as smartphones, have achieved computing and networking capabilities comparable to traditional personal comp...

Android Application Security Essentials

# Android Application Security Essentials

Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everyth...

Android Security Internals

# Android Security Internals

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Andro...

Android Hacker's Handbook

# Android Hacker's Handbook

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues...

Android Security Cookbook

# Android Security Cookbook

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabi...

Secure Coding in C and C++

# Secure Coding in C and C++

Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually...

The Shellcoder's Handbook: Discovering and Exploit

# The Shellcoder's Handbook: Discovering and Exploit

- Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily...

Sockets, Shellcode, Porting & Coding

# Sockets, Shellcode, Porting & Coding

The book is logically divided into 5 main categories with each category representing a major skill set required by most security...

19 Deadly Sins of Software Security

# 19 Deadly Sins of Software Security

This essential book for all software developers~~regardless of platform, language, or type of application~~outlines the “19 dead...

Rootkits : Subverting the Windows Kernel

# Rootkits : Subverting the Windows Kernel

This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrator...

Android Apps Security

# Android Apps Security

Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It expl...

Application Security for the Android Platform

# Application Security for the Android Platform

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provid...

Metasploit Toolkit for Penetration Testing, Exploi

# Metasploit Toolkit for Penetration Testing, Exploi

This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discu...

Practical Malware Analysis

# Practical Malware Analysis

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act qu...