Buch, Englisch, 192 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 453 g
A Hands-On Approach
Buch, Englisch, 192 Seiten, Format (B × H): 156 mm x 234 mm, Gewicht: 453 g
ISBN: 978-1-032-58517-8
Verlag: Taylor & Francis Ltd
As mobile applications become prime targets for cyber threats, Mobile Penetration Testing – A Hands-On Approach provides a comprehensive, practical guide to assessing and securing Android applications. This book follows industry-standard methodologies, covering key topics such as Android architecture, OWASP Mobile Top 10, reversing, traffic interception, and real-world hacking scenarios.
Through step-by-step walkthroughs, case studies, and hands-on exercises, readers will learn to identify and exploit vulnerabilities effectively. The book is suitable for cybersecurity professionals, students, and enthusiasts, and also serves as a valuable resource for those preparing for certifications like eMAPT and GMOB. If you're a beginner, this guide equips you with the skills needed to perform mobile penetration testing in real-world environments.
Zielgruppe
Professional Practice & Development, Professional Reference, Professional Training, and Undergraduate Core
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Drahtlostechnologie
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Handheld Programmierung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Schadprogramme (Viren, Trojaner etc.)
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
Weitere Infos & Material
Chapter 1: The Essentials Chapter 2: Preparing the Pentesting Lab Chapter 3: OWASP Mobile Top 10 Chapter 4: Introduction to ADB Chapter 5: Reversing & Traffic Interception of Apps Chapter 6: Hacking an App - Diva Chapter 7: The Report Writing & Final Words