Library Logo
Normal view MARC view ISBD view

Automated security analysis of Android and iOS applications with mobile security framework / [electronic resource]

by Abraham, Ajin [author.]; Dalziel, Henry [editor.].
Material type: materialTypeLabelBookPublisher: Waltham, MA : Syngress/Elsevier, 2016.Description: 1 online resource (30 pages) : color illustrations.ISBN: 9780128051054; 0128051051.Subject(s): Application software -- Security measures | COMPUTERS -- Security -- General | Electronic book | Electronic books | Electronic booksOnline resources: ScienceDirect
Contents:
The mobile application pentest -- Configuring mobile security framework for static analysis -- Static analysis -- Configuring MobSF for dyanmic analysis -- Case studies.
Summary: "Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks"--Provided by publisher.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

"Syngress is an imprint of Elsevier"--Colophon.

The mobile application pentest -- Configuring mobile security framework for static analysis -- Static analysis -- Configuring MobSF for dyanmic analysis -- Case studies.

"Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks"--Provided by publisher.

Print version record.

There are no comments for this item.

Log in to your account to post a comment.
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login