Android security cookbook /
Enregistré dans:
Auteur principal: | Makan, Keith |
---|---|
Autres auteurs: | Alexander-Brown, Scott |
Format: | Électronique eBook |
Langue: | anglais |
Publié: |
Birmingham :
Packt Publishing,
2013.
|
Sujets: | |
Accès en ligne: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Android security internals : an in-depth guide to android's security architecture /
par: Elenkov, Nikolay
Publié: (2015)
par: Elenkov, Nikolay
Publié: (2015)
Android forensics investigation, analysis, and mobile security for Google Android /
par: Hoog, Andrew
Publié: (2011)
par: Hoog, Andrew
Publié: (2011)
The mobile application hacker's handbook /
par: Chell, Dominic
Publié: (2015)
par: Chell, Dominic
Publié: (2015)
Testing and securing android studio applications : debug and secure your android applications with android studio /
par: Zapata, Belén Cruz, et autres
Publié: (2014)
par: Zapata, Belén Cruz, et autres
Publié: (2014)
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications /
par: Gupta, Aditya
Publié: (2014)
par: Gupta, Aditya
Publié: (2014)
Beginning Android programming with Android Studio /
par: DiMarzio, J. F.
Publié: (2017)
par: DiMarzio, J. F.
Publié: (2017)
Beginning Android 4 application development
par: Lee, Wei-Meng
Publié: (2012)
par: Lee, Wei-Meng
Publié: (2012)
Android design patterns interaction design solutions for developers /
par: Nudelman, Greg
Publié: (2013)
par: Nudelman, Greg
Publié: (2013)
Android programming : pushing the limits /
par: Hellman, Erik
Publié: (2014)
par: Hellman, Erik
Publié: (2014)
XDA Developers' Android hacker's toolkit the complete guide to rooting, ROMs and theming /
par: Tyler, Jason
Publié: (2012)
par: Tyler, Jason
Publié: (2012)
Security in distributed and networking systems
Publié: (2007)
Publié: (2007)
iOS hacker's handbook
Publié: (2012)
Publié: (2012)
Implementing email security and tokens current standards, tools, and practices /
par: Turner, Sean
Publié: (2008)
par: Turner, Sean
Publié: (2008)
z/OS 1.6 security services update
par: Kappeler, Patrick
Publié: (2005)
par: Kappeler, Patrick
Publié: (2005)
Enterprise security a data-centric approach to securing the enterprise : a guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise /
par: Woody, Aaron
Publié: (2013)
par: Woody, Aaron
Publié: (2013)
Enterprise android : programming android database applications for the enterprise /
par: Mednieks, Zigurd
Publié: (2014)
par: Mednieks, Zigurd
Publié: (2014)
Security intelligence : a practitioner's guide to solving enterprise security challenges /
par: Li, Qing, et autres
Publié: (2015)
par: Li, Qing, et autres
Publié: (2015)
Security architect : careers in information security /
par: Collins, Jon
Publié: (2014)
par: Collins, Jon
Publié: (2014)
Beginning Android application development
par: Lee, Wei-Meng
Publié: (2011)
par: Lee, Wei-Meng
Publié: (2011)
Mobile security : how to secure, privatize, and recover your devices : keep your data secure on the go /
par: Speed, Tim
Publié: (2013)
par: Speed, Tim
Publié: (2013)
The secure online business handbook a practical guide to risk management and business continuity /
Publié: (2006)
Publié: (2006)
Professional Android sensor programming
par: Milette, Greg
Publié: (2012)
par: Milette, Greg
Publié: (2012)
Essential computer security everyone's guide to e-mail, internet, and wireless security /
par: Bradley, Tony
Publié: (2006)
par: Bradley, Tony
Publié: (2006)
Android native development kit cookbook
par: Liu, Feipeng
Publié: (2013)
par: Liu, Feipeng
Publié: (2013)
z/OS diagnostic data collection and analysis /
par: Rogers, Paul
Publié: (2005)
par: Rogers, Paul
Publié: (2005)
Hack proofing your e-commerce site the only way to stop a hacker is to think like one /
Publié: (2001)
Publié: (2001)
Mac security bible
par: Kissell, Joe
Publié: (2010)
par: Kissell, Joe
Publié: (2010)
Web commerce security design and development /
par: Nahari, Hadi
Publié: (2011)
par: Nahari, Hadi
Publié: (2011)
A business guide to information security how to protect your company's IT assets, reduce risks and understand the law /
par: Calder, Alan, 1957-
Publié: (2005)
par: Calder, Alan, 1957-
Publié: (2005)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
par: Mularien, Peter
Publié: (2010)
par: Mularien, Peter
Publié: (2010)
Android application development cookbook 93 recipes for building winning apps /
par: Lee, Wei-Meng
Publié: (2012)
par: Lee, Wei-Meng
Publié: (2012)
Flash development for Android cookbook over 90 recipes to build exciting Android applications with Flash, Flex, and AIR /
par: Labrecque, Joseph
Publié: (2011)
par: Labrecque, Joseph
Publié: (2011)
Android NDK discover the native side of Android and inject the power of C/C++ in your applications : beginner's guide /
par: Ratabouil, Sylvain
Publié: (2012)
par: Ratabouil, Sylvain
Publié: (2012)
Asynchronous Android /
par: Liles, Steve
Publié: (2013)
par: Liles, Steve
Publié: (2013)
Android 4 new features for application development ; develop Android applications using the new features of Android Ice Cream Sandwich /
par: Aydin, Murat
Publié: (2012)
par: Aydin, Murat
Publié: (2012)
Metasploit penetration testing cookbook over 70 recipes to master the most widely used penetration testing framework /
par: Singh, Abhinav
Publié: (2012)
par: Singh, Abhinav
Publié: (2012)
Near field communication with Android cookbook : discover the endless possibilities of using Android NFC capabilities to enhance your apps over 50 practical recipes /
par: Subtil, Vitor
Publié: (2014)
par: Subtil, Vitor
Publié: (2014)
Professional Android programming with Mono for Android and .NET/C#
Publié: (2012)
Publié: (2012)
Citrix xenmobile mobile device management : gain an insight into the industry's best and most secure : enterprise mobility management solution /
par: Phoenix, Akash
Publié: (2014)
par: Phoenix, Akash
Publié: (2014)
Learning Android canvas /
par: Tahir, Mir Nauman
Publié: (2013)
par: Tahir, Mir Nauman
Publié: (2013)
Documents similaires
-
Android security internals : an in-depth guide to android's security architecture /
par: Elenkov, Nikolay
Publié: (2015) -
Android forensics investigation, analysis, and mobile security for Google Android /
par: Hoog, Andrew
Publié: (2011) -
The mobile application hacker's handbook /
par: Chell, Dominic
Publié: (2015) -
Testing and securing android studio applications : debug and secure your android applications with android studio /
par: Zapata, Belén Cruz, et autres
Publié: (2014) -
Learning pentesting for Android devices : a practical guide to learning penetration testing for Android devices and applications /
par: Gupta, Aditya
Publié: (2014)