Hacking Exposed Mobile: Security Secrets & Solutions
A**R
Good & Bad
Being a security professional, and being a mobile developer (and advocate) I find that the book is largely a regurgitation of online content - in a rather long, drawn out process. I have read several other "Hacking Exposed" books and have found them well presented and with good coverage and knowledge transfer. I don't find this one at the same level. Mediocre coverage (for instance could have gotten into the cellular telephony aspects deeper), and mediocre knowledge transfer.If you know nothing about mobile or mobile security, this might be a kick-ass book for you. If you know something, it is a snoozer trying to get to anything novel - which you don't.I am also disappointed that unlike previous Hacking Exposed books, this one does not take an "exploitation" format like the others do, and when it does it does an incomplete job of it in most cases.
T**M
Thorough, well written and appeals to broad audience
This is such a fun read. Lots of great and stimulating ideas spring from my head every time I read another chapter.It can get deep but most is a straightforward of vulnerabilities,hacks and how to avoid or close the hole, if possible.Android has so many unpatched versions out there. Oh and IOS is not as secure as the Apple Geniuses and sales rep say.Think of it this way. Android is Linux-based and IOS,like MAC OS are BSD Unix based. Due to all the versions of Android and the slow patch installations from carriers, more exploits still work.I highly recommend this book for security researchers, app developers and testers, as well as the millions of techie users of smartphones who want to get under the hood of these devices.
C**G
author Joel Shambray
Bought the book as one of a few resources to use for generating a training on Secure Mobile Development. One of the author's Joel S. was visiting the company I work with and brought two of his books to sign for us, but we are not allowed to take anything from anyone who does not work at our company. I happened to have this book in my trunk going from building to building like I do - so he got to sign this for me after all O) - great material in the book for training your mobile development teams on Secure Coding.
J**.
Great resource
The book offers an excellent overview of mobile device/application security information and tools. It also offers tidbits of good information for those that have been doing security work.I would have liked to see more detailed, practical information on some elements. I recommend this book for anyone looking for a primer on mobile security.
L**S
A must for serious security profesisonals
With the "big bang" in mobility, the term "BYOD" for "Bring Your Own Device" may well be equivalent to "Bring Your Own Disaster", specially with the growing number of "connected things" that reach the workplace as "personal items" today.A detailed, practical and useful guide for those that really need to secure the information (both personal and corporate) that travels at risk every day in the pockets of the average employee of our times.
J**E
Gives general knowlege but few details
This is a good overview book but lacks details. It is not useful to someone trying to become a security expert on mobile devices. I chose to keep it but considered returning it. I am teaching a class on cell phones later this year and it was good to refresh my memory on mobile devices.
O**1
HACKING EXPOSED BOOKS ARE GREAT!!
I own every hacking exposed book ever printed that i am aware of. These are great sources for learning and structuring skills in many valuable situations. They are based on theory and have great examples when you would use the necessary solutions to achieve of overcome challenges.They are Great Books!! ---That is my opinion!
E**T
Good overview
The books gives a good introduction in a comprehensive ans informative way. But it always leaves you wanting to read more.
S**Z
Not enough depth
The 'Hacking the cellular network' section was interesting for understanding the basics but just didn't go into enough detail on the potential threats. The 'Android' section relevant to lots of our work at ID Theft Protect also wasn't as in depth. Maybe I was expecting too much. If you want to learn about mobile security and hacking at an elementary level, then this book is good for you.
V**.
Five Stars
Nice book.CVS.
Trustpilot
2 months ago
2 weeks ago