

Full description not available
B**Y
Five Stars
Excellent book written by a very knowledgeable researcher.
G**A
Five Stars
Really good book!
A**R
Very good book.
Very good book.
J**Y
A must for mobile developers of iPhone and Andoid - also includes Windows Phone, Blackberry and cross-browser
This is a good old fashioned massive computer book about 3 inches thick. The main interst to me was the inclusion of 200 pages of Windows Phone which most people seem to write off as a novelty. Of course there is also iPhone, Android, Blackberry and Cross-Browser. Each type of phone has a "analysing" chapter to find vulnerabilities. Then they each have a large chapter on attacking, then a chapter on identifying implementation issues followed by writing secure code. There is a huge amount of information even if you focus on just one type of phone. I found some of it to be quite hard going or short in places (hence 4*), but overal there is massive depth. If you are a mobile developer it is certainly worth checking out.
J**N
Excellent book useful for mobile phone security and forensic specialists
i work in the computer security industry and found this book to be treasure trove of information on the Android, Blackberry Windows and IOS operating systems. Its not going to be an easy read for complete novices. However I would recommend it to those involved in programming for mobile applications and who are security minded or are interested in hacking mobile phones/applications.. Computer Forensic/Mobile examiners will also find this useful as a reference book. This book is also useful for penetration testers.
S**Y
Brilliantly in-depth for any budding pen-tester
This is a much recommended book for anyone looking into understanding the internals for all popular mobile platform including iOS, Android, Blackberry and Windows. The book dives deep into many aspects of the security model and it’s quirks, giving way to understanding the potential areas available for exploitation. In addition the topics also cover security design and what could be done to develop secure applications and guard against mentioned weaknesses. There are also chapters that walks you through the practical elements of the security models and demonstrates how certain areas can be bypassed. These practical exercises utilises tools that are open sources and can be easily accessible. Once you have the fundamental understanding, the practicals are rewarding and fun! The book gives a comprehensive foundation for those looking to understand the security model of each mobile platform and how applications sit within these models. The basis will allow you to have the fundamental understanding to enable you to potentially spot possible future vulnerabilities and thus a better penetration tester.
•**•
Extensive and well written
This is quite a tome, but its physical weight is matched by the weight of details it contains on all the major mobile platforms. Each platform is approached in terms of its vulnerabilities, and then how to write apps that try to avoid these vulnerabilities. Of course, the book will never be complete, as more loopholes are discovered constantly, but it shows the state of the art at time of writing.I doubt if many users will read this cover to cover, they will dip in to study one platform or to compare platforms, if writing cross-platform apps. Sadly, the latter hardly exist apart from as web apps, since each platform uses Java, C, Microsoft Net, etc.Interestingly, and only mentioned in passing, a devastating vulnerability in security can be caused by nothing more than a poor choice of developer language coupled with a programmer error. If you don't believe this, Google the following:goto fail;I recommend this book to both app writers and also security specialists. It will give you a good idea of what you are up against!
M**N
Impressively in-depth
This is a very impressive book, covering mobile security from all angles and across iOS, Android, Windows Mobile and even Blackberry platforms, with a long section on each written by experts in their respective field. The result is a huge and comprehensive reference book and a very handy guide for application developers wishing to pre-empty possible attack vectors that hackers could use to compromise their users' security.
Trustpilot
4 days ago
1 week ago