Zetech University Library - Online Catalog

Mobile: +254-705278678

Whatsapp: +254-706622557

Feedback/Complaints/Suggestions

library@zetech.ac.ke

Mobile App Reverse Engineering : (Record no. 8276)

MARC details
000 -LEADER
fixed length control field 05140cam a22005297a 4500
001 - CONTROL NUMBER
control field on1317324364
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20241121073021.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220514s2022 enka o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EBLCP
Language of cataloging eng
Description conventions pn
Transcribing agency EBLCP
Modifying agency ORMDA
-- OCLCF
-- OCLCQ
-- N$T
-- UKMGB
-- OCLCQ
-- IEEEE
-- OCLCO
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBC274167
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 020566472
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1801074909
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781801074902
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Cancelled/invalid ISBN 9781801073394 (pbk.)
035 ## - SYSTEM CONTROL NUMBER
System control number 3270552
-- (N$T)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1317324364
037 ## - SOURCE OF ACQUISITION
Stock number 9781801073394
Source of stock number/acquisition O'Reilly Media
037 ## - SOURCE OF ACQUISITION
Stock number 10163628
Source of stock number/acquisition IEEE
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.76.A65
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.1
Edition number 23/eng/20220602
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Mishra, Abhinav.
9 (RLIN) 19715
245 10 - TITLE STATEMENT
Title Mobile App Reverse Engineering :
Remainder of title Get Started with Discovering, Analyzing, and Exploring the Internals of Android and IOS Apps /
Statement of responsibility, etc Abhinav Mishra.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Birmingham :
Name of publisher, distributor, etc Packt Publishing, Limited,
Date of publication, distribution, etc 2022.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (166 pages) :
Other physical details color illustrations
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 0# -
-- Print version record.
520 ## - SUMMARY, ETC.
Summary, etc Delve into the world of mobile application reverse engineering, learn the fundamentals of how mobile apps are created and their internals, and analyze application binaries to find security issues Key Features Learn the skills required to reverse engineer mobile applications Understand the internals of iOS and Android application binaries Explore modern reverse engineering tools such as Ghidra, Radare2, Hopper, and more Book Description Mobile App Reverse Engineering is a practical guide focused on helping cybersecurity professionals scale up their mobile security skills. With the IT world's evolution in mobile operating systems, cybercriminals are increasingly focusing their efforts on mobile devices. This book enables you to keep up by discovering security issues through reverse engineering of mobile apps. This book starts with the basics of reverse engineering and teaches you how to set up an isolated virtual machine environment to perform reverse engineering. You'll then learn about modern tools such as Ghidra and Radare2 to perform reverse engineering on mobile apps as well as understand how Android and iOS apps are developed. Next, you'll explore different ways to reverse engineer some sample mobile apps developed for this book. As you advance, you'll learn how reverse engineering can help in penetration testing of Android and iOS apps with the help of case studies. The concluding chapters will show you how to automate the process of reverse engineering and analyzing binaries to find low-hanging security issues. By the end of this reverse engineering book, you'll have developed the skills you need to be able to reverse engineer Android and iOS apps and streamline the reverse engineering process with confidence. What you will learn Understand how to set up an environment to perform reverse engineering Discover how Android and iOS application packages are built Reverse engineer Android applications and understand their internals Reverse engineer iOS applications built using Objective C and Swift programming Understand real-world case studies of reverse engineering Automate reverse engineering to discover low-hanging vulnerabilities Understand reverse engineering and how its defense techniques are used in mobile applications Who this book is for This book is for cybersecurity professionals, security analysts, mobile application security enthusiasts, and penetration testers interested in understanding the internals of iOS and Android apps through reverse engineering. Basic knowledge of reverse engineering as well as an understanding of mobile operating systems like iOS and Android and how mobile applications work on them are required.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Table of Contents Basics of Reverse Engineering – Understanding the Structure of Mobile Apps Setting Up a Mobile App Reverse Engineering Environment Using Modern Tools Reverse Engineering an Android Application Reverse Engineering an iOS Application Reverse Engineering an iOS Application (Developed Using Swift) Open Source and Commercial Reverse Engineering Tools Automating the Reverse Engineering Process Conclusion.
590 ## - LOCAL NOTE (RLIN)
Local note Added to collection customer.56279.3
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software
General subdivision Development.
9 (RLIN) 1554
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile apps
General subdivision Testing.
9 (RLIN) 19716
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software
General subdivision Testing.
9 (RLIN) 19717
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Logiciels d'application
General subdivision D�eveloppement.
9 (RLIN) 19016
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software
General subdivision Development
Source of heading or term fast
9 (RLIN) 1554
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software
General subdivision Testing
Source of heading or term fast
9 (RLIN) 19717
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Mishra, Abhinav.
Title Mobile App Reverse Engineering.
Place, publisher, and date of publication Birmingham : Packt Publishing, Limited, �2022
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified EBSCOhost
Uniform Resource Identifier <a href="https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3270552">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3270552</a>
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL6970217
938 ## -
-- EBSCOhost
-- EBSC
-- 3270552
994 ## -
-- 92
-- N$T

No items available.