The Mobile Application Hacker s Handbook

The Mobile Application Hacker s Handbook

Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms.

Author: Dominic Chell

Publisher: John Wiley & Sons

ISBN: 9781118958506

Category: Computers

Page: 816

View: 232

A comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. This book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Mobile platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security.
Categories: Computers

The Web Application Hacker s Handbook

The Web Application Hacker s Handbook

This innovative book shows you how they do it. This is hands-on stuff.

Author: Dafydd Stuttard

Publisher: John Wiley & Sons

ISBN: 9781118079614

Category: Computers

Page: 768

View: 893

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.
Categories: Computers

Android Hacker s Handbook

Android Hacker s Handbook

This book explains how the operating system works, security risks associated with it, and the overall security architecture of the operating system.

Author: Joshua J. Drake

Publisher: John Wiley & Sons

ISBN: 9781118608647

Category: Computers

Page: 576

View: 628

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Categories: Computers

Handbook of Mems for Wireless and Mobile Applications

Handbook of Mems for Wireless and Mobile Applications

2, pp. 356–362. Tan, G.L., Mihailovich, R.E., Hacker, J.B., DeNatale, J.F., and
Rebeiz, G.M. (2002) 'A very-low-loss 2-bit X-band RF MEMS phase shifter',
Microwave Symposium Digest, 2002 IEEE MTT-S International, vol. 1, pp. 333–
335. Tan ...

Author: Deepak Uttamchandani

Publisher: Elsevier

ISBN: 9780857098610

Category: Technology & Engineering

Page: 640

View: 715

The increasing demand for mobile and wireless sensing necessitates the use of highly integrated technology featuring small size, low weight, high performance and low cost: micro-electro-mechanical systems (MEMS) can meet this need. The Handbook of MEMS for wireless and mobile applications provides a comprehensive overview of radio frequency (RF) MEMS technologies and explores the use of these technologies over a wide range of application areas. Part one provides an introduction to the use of RF MEMS as an enabling technology for wireless applications. Chapters review RF MEMS technology and applications as a whole before moving on to describe specific technologies for wireless applications including passive components, phase shifters and antennas. Packaging and reliability of RF MEMS is also discussed. Chapters in part two focus on wireless techniques and applications of wireless MEMS including biomedical applications, such as implantable MEMS, intraocular pressure sensors and wireless drug delivery. Further chapters highlight the use of RF MEMS for automotive radar, the monitoring of telecommunications reliability using wireless MEMS and the use of optical MEMS displays in portable electronics. With its distinguished editor and international team of expert authors, the Handbook of MEMS for wireless and mobile applications is a technical resource for MEMS manufacturers, the electronics industry, and scientists, engineers and academics working on MEMS and wireless systems. Reviews the use of radio frequency (RF) MEMS as an enabling technology for wireless applications Discusses wireless techniques and applications of wireless MEMS, including biomedical applications Describes monitoring structures and the environment with wireless MEMS
Categories: Technology & Engineering

The Browser Hacker s Handbook

The Browser Hacker s Handbook

This comprehensive guide will show you exactly how hackers target browsers and exploit their weaknesses to establish a beachhead and launch attacks deep into your network. Fight back with The Browser Hacker’s Handbook.

Author: Wade Alcorn

Publisher: John Wiley & Sons

ISBN: 9781118662090

Category: Computers

Page: 648

View: 272

Hackers exploit browser vulnerabilities to attack deep withinnetworks The Browser Hacker's Handbook gives a practicalunderstanding of hacking the everyday web browser and using it as abeachhead to launch further attacks deep into corporate networks.Written by a team of highly experienced computer security experts,the handbook provides hands-on tutorials exploring a range ofcurrent attack methods. The web browser has become the most popular and widely usedcomputer "program" in the world. As the gateway to the Internet, itis part of the storefront to any business that operates online, butit is also one of the most vulnerable entry points of any system.With attacks on the rise, companies are increasingly employingbrowser-hardening techniques to protect the unique vulnerabilitiesinherent in all currently used browsers. The Browser Hacker'sHandbook thoroughly covers complex security issues and exploresrelevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to accessbrowsers DNS tunneling, attacking web applications, andproxying—all from the browser Exploiting the browser and its ecosystem (plugins andextensions) Cross-origin attacks, including Inter-protocol Communicationand Exploitation The Browser Hacker's Handbook is written with aprofessional security engagement in mind. Leveraging browsers aspivot points into a target's network should form an integralcomponent into any social engineering or red-team securityassessment. This handbook provides a complete methodology tounderstand and structure your next browser penetration test.
Categories: Computers

iOS Hacker s Handbook

iOS Hacker s Handbook

With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all.

Author: Charlie Miller

Publisher: John Wiley & Sons

ISBN: 9781118240755

Category: Computers

Page: 408

View: 281

Discover all the security risks and exploits that can threateniOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad.With the introduction of iOS5, many security issues have come tolight. This book explains and discusses them all. The award-winningauthor team, experts in Mac and iOS security, examines thevulnerabilities and the internals of iOS to show how attacks can bemitigated. The book explains how the operating system works, itsoverall security architecture, and the security risks associatedwith it, as well as exploits, rootkits, and other payloadsdeveloped for it. Covers iOS security architecture, vulnerability hunting,exploit writing, and how iOS jailbreaks work Explores iOS enterprise and encryption, code signing and memoryprotection, sandboxing, iPhone fuzzing, exploitation, ROP payloads,and baseband attacks Also examines kernel debugging and exploitation Companion website includes source code and tools to facilitateyour efforts iOS Hacker's Handbook arms you with the tools needed toidentify, understand, and foil iOS attacks.
Categories: Computers

Ubiquitous Inclusive Learning in a Digital Era

Ubiquitous Inclusive Learning in a Digital Era

Apps in Higher Education: Criteria and Evaluation. The Charleston ... The mobile
application hacker's handbook. ... American Journal of Preventive Medicine, 46(6
), 649–652. doi:10.1016/j.amepre.2014.01.010 PMID:24842742 Du, Y. (2015).

Author: Ossiannilsson, Ebba

Publisher: IGI Global

ISBN: 9781522562931

Category: Education

Page: 300

View: 543

In open education, equality, accessibility, inclusiveness, and lifelong learning are key concerns. To meet, adapt to, and anticipate global goals and needs, as well as address open education concerns, educational programs require systemic changes and innovative leadership for advanced learning environments. Ubiquitous Inclusive Learning in a Digital Era provides innovative insights into the issues and current trends on open, online, flexible education and technology-enabled learning. The content within this publication represents the work of open online learning, hybrid learning, and inclusiveness. It is designed for educational administrators, teachers, librarians, government officials, and graduate-level students seeking covering on topics centered on educational technologies and equal access education.
Categories: Education

Hacking Your Mobile Device

Hacking Your Mobile Device

Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms.

Author: Anonymous person

Publisher:

ISBN: 9798689042909

Category:

Page: 104

View: 963

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security
Categories:

Handbook of Research in Mobile Business Second Edition Technical Methodological and Social Perspectives

Handbook of Research in Mobile Business  Second Edition  Technical  Methodological and Social Perspectives

Society has begun to place pressure on organisations to implement stronger
controls to prevent hackers from gaining ... in the authentication space by utilising
a mobile application named Closed Loop Environment for Wireless (CLEW®).

Author: Unhelkar, Bhuvan

Publisher: IGI Global

ISBN: 9781605661575

Category: Business & Economics

Page: 688

View: 130

"This book collects the latest research advances in the rapidly evolving field of mobile business"--Provided by publisher.
Categories: Business & Economics

A Complete Hackers Handbook

A Complete Hackers Handbook

Provides a brief history of computer hacking and includes information about computer security and how to guard against computer hackers.

Author: Dr. K.

Publisher: Carlton Books Limited

ISBN: 1842227246

Category: Computers

Page: 256

View: 177

Provides a brief history of computer hacking and includes information about computer security and how to guard against computer hackers.
Categories: Computers

Gray Hat Hacking The Ethical Hackers Handbook 3rd Edition

Gray Hat Hacking The Ethical Hackers Handbook  3rd Edition

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws.

Author: Allen Harper

Publisher: McGraw Hill Professional

ISBN: 9780071742566

Category: Computers

Page: 720

View: 960

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource. Develop and launch exploits using BackTrack and Metasploit Employ physical, social engineering, and insider attack techniques Build Perl, Python, and Ruby scripts that initiate stack buffer overflows Understand and prevent malicious content in Adobe, Office, and multimedia files Detect and block client-side, Web server, VoIP, and SCADA attacks Reverse engineer, fuzz, and decompile Windows and Linux software Develop SQL injection, cross-site scripting, and forgery exploits Trap malware and rootkits using honeypots and SandBoxes
Categories: Computers

IT Manager s Handbook

IT Manager s Handbook

Black-hat hackers: hackers interested in discovering security flaws in order to
take advantage and abuse them— usually for profit, but oftentimes just to see
what trouble they can cause. Bring Your Own (BYO) Policy: policy associated
with mobile devices that allows employees to use their own devices for ...
Business Applications: software packages that allow the users and the business
to do their job(s).

Author: Bill Holtsnider

Publisher: Elsevier

ISBN: 9780123914057

Category: Computers

Page: 368

View: 996

IT Manager’s Handbook, Third Edition, provides a practical reference that you will return to again and again in an ever-changing corporate environment where the demands on IT continue to increase. Make your first 100 days really count with the fundamental principles and core concepts critical to your success as a new IT Manager. This is a must-read for new IT managers and a great refresher for seasoned managers trying to maintain expertise in the rapidly changing IT world. This latest edition includes discussions on how to develop an overall IT strategy as well as demonstrate the value of IT to the company. It will teach you how to: manage your enterprise’s new level of connectivity with a new chapter covering social media, handheld devices, and more; implement and optimize cloud services to provide a better experience for your mobile and virtual workforce at a lower cost to your bottom line; integrate mobile applications into your company’s strategy; and manage the money, including topics such as department budgets and leasing versus buying. You will also learn how to work with your customers, whomever those might be for your IT shop; hire, train, and manage your team and their projects so that you come in on time and budget; and secure your systems to face some of today's most challenging security challenges. This book will appeal to new IT managers in all areas of specialty, including technical professionals who are transitioning into IT management. Manage your enterprise’s new level of connectivity with a NEW chapter covering social media, handheld devices, and more Implement and optimize cloud services to provide a better experience for your mobile and virtual workforce at a lower cost to your bottom line Integrate mobile applications into your company’s strategy Manage the money, including topics such as department budgets and leasing versus buying Work with your "customers", whomever those might be for your IT shop Hire, train, and manage your team and their projects so that you come in on time and budget Secure your systems to face some of today's most challenging security challenges
Categories: Computers

The IoT Hacker s Handbook

The IoT Hacker s Handbook

What You’ll Learn Perform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in ...

Author: Aditya Gupta

Publisher: Apress

ISBN: 9781484243008

Category: Computers

Page: 320

View: 366

Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You'll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You'll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker's Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely. What You’ll Learn Perform a threat model of a real-world IoT device and locate all possible attacker entry points Use reverse engineering of firmware binaries to identify security issues Analyze,assess, and identify security issues in exploited ARM and MIPS based binaries Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee Who This Book is For Those interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.
Categories: Computers

The Hacker s Handbook III

The Hacker s Handbook III

... Fixed / mobile ( CB ) ( 26 . 975 – 27 . 2835 ISM ) Meteorological aids / fixed /
mobile ( CB ) Amateur Fixed / mobile 27500 - 28000 28000 29700 - 29700 -
30005 Note These allocations are as they apply in Europe ; 224 Hacker ' s
Handbook ...

Author: Hugo Cornwall

Publisher: Random House (UK)

ISBN: STANFORD:36105040778701

Category: Computers

Page: 233

View: 955

Categories: Computers

Mobile Applications

Mobile Applications

... kernel Poniatowski UNIX User ' s Handbook , Second Edition Stone / Symons
UNIX Fault Management COMPUTER ... and Practice Trusted Computing
Platforms Halting the Hacker , Second Edition Information Security Mobile
Applications ...

Author: Valentino Lee

Publisher: Prentice Hall

ISBN: UOM:39015059564222

Category: Computers

Page: 340

View: 288

Spending on worldwide wireless and mobile network infrastructure will rise by $10.7 billion between 2002 and 2007. In this new resource, the authors provide technology-independent principles and practices that no mobile application developer should be without. This book illustrates specific details of mobile technologies and includes mobile application case studies.
Categories: Computers

E Mail Virus Protection Handbook

E Mail Virus Protection Handbook

Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
Syngress ... It was so easy, in fact, that if the PHF application was installed, the
user name and password informa- tion would appear ... The PHF bug is no
longer a real threat, because most hackers and systems administrators already
know about it.

Author: Syngress

Publisher: Elsevier

ISBN: 0080477534

Category: Computers

Page: 476

View: 312

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher Focuses on specific safeguards and solutions that are readily available to users
Categories: Computers

The Car Hacker s Handbook

The Car Hacker s Handbook

The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern ­vehicles.

Author: Craig Smith

Publisher: No Starch Press

ISBN: 9781593277031

Category: Technology & Engineering

Page: 304

View: 178

“The world needs more hackers, and the world definitely needs more car hackers. We’re all safer when the systems we depend upon are inspectable, auditable, and documented—and this definitely includes cars.” —Chris Evans, from the Foreword “By turns funny, scary, and intriguing, The Car Hacker's Handbook is a practical guide for tinkerers and a fantastic overview for people who want to know what's going on when they strap themselves into a multi-ton, high-speed computer.” —Cory Doctorow, Boing Boing “The Car Hacker’s Handbook describes, in meticulous detail, how your car’s components talk both to one another and to diagnosticians—outlining all the ways good and bad guys can modify or attack the systems.” —The Wall Street Journal Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more ­convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving ­millions vulnerable to attack. The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern ­vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and ­between devices and systems. Then, once you have an understanding of a ­vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ­ChipWhisperer, The Car Hacker’s Handbook will show you how to: -Build an accurate threat model for your vehicle -Reverse engineer the CAN bus to fake engine signals -Exploit vulnerabilities in diagnostic and data-logging systems -Hack the ECU and other firmware and embedded systems -Feed exploits through infotainment and vehicle-to-vehicle communication systems -Override factory settings with performance-tuning techniques -Build physical and virtual test benches to try out exploits safely If you’re curious about automotive security and have the urge to hack a two-ton computer, makeThe Car Hacker’s Handbook your first stop.
Categories: Technology & Engineering

The Oracle Hacker S Handbook Hacking And Defending Oracle

The Oracle Hacker S Handbook  Hacking And Defending Oracle

The Oracle Hacker's Handbook will examine in depth all the techniques and tools hackers use to break into Oracle database servers.

Author: David Litchfield

Publisher: John Wiley & Sons

ISBN: 8126511699

Category: Database security

Page: 212

View: 853

The Oracle Hacker's Handbook will examine in depth all the techniques and tools hackers use to break into Oracle database servers. In understanding the way hackers attack their systems, IT professionals can better understand the risk that their systems are exposed to and consequently can build and employ better defensive strategies. As the boundaries between networks blur, Oracle database servers are more exposed than ever and while Oracle database administrators recognize that they're exposed to new threats they don't have the information at hand to be able to fully appreciate the problem and deal with it in the most effective and efficient way. The Oracle Hacker's Handbook will become the foundation of this knowledge.Chapter 1 Overview of the Oracle RDBMSChapter 2 The Oracle Network ArchitectureChapter 3 Attacking the TNS Listener and DispatchersChapter 4 Attacking the Authentication ProcessChapter 5 Oracle and PL/SQLChapter 6 TriggersChapter 7 Indirect Privilege EscalationChapter 8 Defeating Virtual Private DatabasesChapter 9 Attacking Oracle PL/SQL Web ApplicationsChapter 10 Running Operating System CommandsChapter 11 Accessing the File SystemChapter 12 Accessing the Network
Categories: Database security

Gray Hat Hacking The Ethical Hacker s Handbook Fifth Edition

Gray Hat Hacking  The Ethical Hacker s Handbook  Fifth Edition

Figure 18-4 shows the application listing and the application Movie Player
among the other installed applications. Information about Figure 18-4 Installed ...
its permissions, memory usage, and more. Chapter 18: Dissecting Mobile
Malware.

Author: Daniel Regalado

Publisher: McGraw Hill Professional

ISBN: 9781260108422

Category: Computers

Page:

View: 886

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. •Build and launch spoofing exploits with Ettercap •Induce error conditions and crash software using fuzzers •Use advanced reverse engineering to exploit Windows and Linux software •Bypass Windows Access Control and memory protection schemes •Exploit web applications with Padding Oracle Attacks •Learn the use-after-free technique used in recent zero days •Hijack web browsers with advanced XSS attacks •Understand ransomware and how it takes control of your desktop •Dissect Android malware with JEB and DAD decompilers •Find one-day vulnerabilities with binary diffing •Exploit wireless systems with Software Defined Radios (SDR) •Exploit Internet of things devices •Dissect and exploit embedded devices •Understand bug bounty programs •Deploy next-generation honeypots •Dissect ATM malware and analyze common ATM attacks •Learn the business side of ethical hacking
Categories: Computers

Handbook of Research on Information Security and Assurance

Handbook of Research on Information Security and Assurance

In M. Khosrow-Pour (Ed.), Encyclopedia of e-commerce, e-government, and
mobile commerce. Hershey, PA: Idea Group ... The art of intrusion: The real
stories behind the exploits of hackers, intruders, & deceivers. Indianapolis: Wiley
 ...

Author: Gupta, Jatinder N. D.

Publisher: IGI Global

ISBN: 9781599048567

Category: Computers

Page: 586

View: 284

"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher.
Categories: Computers