“The features that make mobile phones interesting and useful are also the features that make them challenging to develop products for, and make them challenging to secure. This book directly addresses these challenges, with detailed guidelines for mobile application developers, with an approach that starts with threat modeling and delves deeper into secure coding and software maintenance practices specific to mobile applications. It’s a valuable resource for anyone developing, publishing, managing or using mobile applications, and an insightful guide for observers of the industry.” — Kai Johnson, Chief Architect, Isis Mobile Commerce
***
The Hacking Exposed books are essential field manuals for everyone in the security industry. The concepts are appropriate whether you are responsible for the top level decisions or the in depth analysis. The Mobile Edition is a prime example, by first guiding you through an in-depth understanding of the risks across all aspects of the mobile ecosystem then stepping through the technology in vivid detail. Mobile devices are no longer simply communication devices, they are the portable handheld window to information, knowledge and power. Understanding the risks and how to navigate through them is not optional. Joel and company once again deliver the authoritative guide with Hacking Exposed Mobile. — Brian Engle, Chief Information Security Officer, State of Texas
***
“To those about to build mobile apps – we salute you! But avoid mistakes: do hello world, and then read this book.” — Gunnar Peterson, Software Security Architect and CTO at Arctec Group
***
“Mobile platforms have transformed the way business is conducted. But the increased convenience, productivity and cost efficiencies can be nullified by security risks if not dealt with appropriately. Therefore, understanding the key mobile threats and controls is essential. Hacking Exposed Mobile continues in the great tradition of the Hacking Exposed series, arming business leaders and technology practitioners with an in-depth understanding of the latest attacks and countermeasures – so they can leverage the power of mobile platforms while ensuring that security risks are contained.”
– Jamil Farshchi, Senior Business Leader of Strategic Planning and Initiatives, VISA
***
“Following the classic Hacking Exposed tradition, Hacking Exposed Mobile is a reference that provides all Information Security practitioners the vision to securing mobile data and devices against threats. All security professionals tasked with managing mobility-enabled enterprise environments will find this timely source absolutely invaluable.”
— Roel F. Rosario, Vice President, Security Architecture and Engineering, Comerica Bank