93,77 €
104,19 €
-10% with code: EXTRA
Automated Security Analysis of Android and IOS Applications with Mobile Security Framework
Automated Security Analysis of Android and IOS Applications with Mobile Security Framework
93,77
104,19 €
  • We will send in 10–14 business days.
Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.
104.19
  • SAVE -10% with code: EXTRA

Automated Security Analysis of Android and IOS Applications with Mobile Security Framework (e-book) (used book) | bookbook.eu

Reviews

(1.00 Goodreads rating)

Description

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

EXTRA 10 % discount with code: EXTRA

93,77
104,19 €
We will send in 10–14 business days.

The promotion ends in 21d.20:56:40

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,04 Book Euros!?
  • Author: Henry Dalziel
  • Publisher:
  • ISBN-10: 0128047186
  • ISBN-13: 9780128047187
  • Format: 15.2 x 22.9 x 0.2 cm, minkšti viršeliai
  • Language: English English

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)