Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to An...
Mobile devices, such as smartphones, have achieved computing and networking capabilities comparable to traditional personal comp...
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everyth...
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Andro...
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues...
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabi...
Learn the Root Causes of Software Vulnerabilities and How to Avoid Them Commonly exploited software vulnerabilities are usually...
- Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily...
The book is logically divided into 5 main categories with each category representing a major skill set required by most security...
This essential book for all software developers~~regardless of platform, language, or type of application~~outlines the “19 dead...
This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrator...
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It expl...
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provid...
This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discu...
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act qu...