Practical Internet of Things Security

Amazon Price: N/A (as of December 12, 2017 21:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A practical, indispensable security guide that will navigate you through the complex realm of securely building and deploying systems in our IoT-connected world

About This BookLearn to design and implement cyber security strategies for your organizationLearn to protect cyber-physical systems and utilize forensic data analysis to beat vulnerabilities in your IoT ecosystemLearn best practices to secure your data from device to the cloudGain insight into privacy-enhancing techniques and technologies
Continue reading “Practical Internet of Things Security”

Practical Mobile Forensics

Rating: 
Amazon Price: N/A (as of December 12, 2017 20:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Dive into mobile forensics on iOS, Android, Windows, and BlackBerry devices with this action-packed, practical guide

About This Book
Clear and concise explanations for forensic examinations of mobile devices
Master the art of extracting data, recovering deleted data, bypassing screen locks, and much more
The first and only guide covering practical mobile forensics on multiple platforms
Continue reading “Practical Mobile Forensics”

Learning Pentesting for Android Devices

Rating: 
Amazon Price: N/A (as of December 12, 2017 17:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A practical guide to learning penetration testing for Android devices and applications

About This Book
Explore the security vulnerabilities in Android applications and exploit them
Venture into the world of Android forensics and get control of devices using exploits
Hands-on approach covers security vulnerabilities in Android using methods such as Traffic Analysis, SQLite vulnerabilities, and Content Providers Leakage
Continue reading “Learning Pentesting for Android Devices”