Learning pentesting for Android /:
This is an easy-to-follow guide, full of hands-on and real-world examples of applications. Each of the vulnerabilities discussed in the book is accompanied with the practical approach to the vulnerability, and the underlying security issue. This book is intended for all those who are looking to get...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing,
2014.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This is an easy-to-follow guide, full of hands-on and real-world examples of applications. Each of the vulnerabilities discussed in the book is accompanied with the practical approach to the vulnerability, and the underlying security issue. This book is intended for all those who are looking to get started in Android security or Android application penetration testing. You don't need to be an Android developer to learn from this book, but it is highly recommended that developers have some experience in order to learn how to create secure applications for Android. |
Beschreibung: | 1 online resource (176 pages) : illustrations. |
Bibliographie: | Includes index. |
ISBN: | 9781783288991 178328899X 1783288981 9781783288984 1306545560 9781306545563 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn875818937 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140405s2014 enka o 001 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d N$T |d OCLCQ |d YDXCP |d OCLCQ |d AGLDB |d OCLCQ |d ICA |d OCLCQ |d ZCU |d XFH |d MERUC |d OCLCQ |d D6H |d OCLCF |d VTS |d ICG |d OCLCQ |d OCLCO |d STF |d DKC |d OCLCQ |d OCLCO |d OCLCQ |d AJS |d TXI |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d SXB |d OCLCQ | ||
019 | |a 907234487 |a 994453535 |a 1264832374 | ||
020 | |a 9781783288991 |q (electronic bk.) | ||
020 | |a 178328899X |q (electronic bk.) | ||
020 | |a 1783288981 | ||
020 | |a 9781783288984 | ||
020 | |a 1306545560 | ||
020 | |a 9781306545563 | ||
035 | |a (OCoLC)875818937 |z (OCoLC)907234487 |z (OCoLC)994453535 |z (OCoLC)1264832374 | ||
050 | 4 | |a QA76.76.A65 | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Gupta, Aditya. | |
245 | 1 | 0 | |a Learning pentesting for Android / |c Aditya Gupta. |
260 | |a Birmingham : |b Packt Publishing, |c 2014. | ||
300 | |a 1 online resource (176 pages) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes index. | ||
505 | 0 | |a Getting started with Android security -- Preparing the battlefield -- Reversing and auditing Android apps -- Traffic analysis for Android devices -- Android forensics -- Playing with SQLite -- Lesser-known Android attacks -- ARM exploitation -- Writing the Pentest report. | |
520 | |a This is an easy-to-follow guide, full of hands-on and real-world examples of applications. Each of the vulnerabilities discussed in the book is accompanied with the practical approach to the vulnerability, and the underlying security issue. This book is intended for all those who are looking to get started in Android security or Android application penetration testing. You don't need to be an Android developer to learn from this book, but it is highly recommended that developers have some experience in order to learn how to create secure applications for Android. | ||
546 | |a English. | ||
588 | 0 | |a Print version record. | |
630 | 0 | 0 | |a Android (Electronic resource) |0 http://id.loc.gov/authorities/names/n2009043077 |
630 | 0 | 7 | |a Android (Electronic resource) |2 fast |
650 | 0 | |a Application software |x Design. | |
650 | 0 | |a Application software |x Development. |0 http://id.loc.gov/authorities/subjects/sh95009362 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Logiciels d'application |x Développement. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a Application software |x Development |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
758 | |i has work: |a Learning Pentesting for Android (Text) |1 https://id.oclc.org/worldcat/entity/E39PCXRHvWDKvkWprTKpK3cFJC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Gupta, Aditya. |t Learning Pentesting for Android. |d Birmingham : Packt Publishing, 2014 |z 9781783288991 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=747088 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL1644013 | ||
938 | |a EBSCOhost |b EBSC |n 747088 | ||
938 | |a YBP Library Services |b YANK |n 11724429 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn875818937 |
---|---|
_version_ | 1816882266688716801 |
adam_text | |
any_adam_object | |
author | Gupta, Aditya |
author_facet | Gupta, Aditya |
author_role | |
author_sort | Gupta, Aditya |
author_variant | a g ag |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.A65 |
callnumber-search | QA76.76.A65 |
callnumber-sort | QA 276.76 A65 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Getting started with Android security -- Preparing the battlefield -- Reversing and auditing Android apps -- Traffic analysis for Android devices -- Android forensics -- Playing with SQLite -- Lesser-known Android attacks -- ARM exploitation -- Writing the Pentest report. |
ctrlnum | (OCoLC)875818937 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04028cam a2200745 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn875818937</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">140405s2014 enka o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">XFH</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AJS</subfield><subfield code="d">TXI</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">907234487</subfield><subfield code="a">994453535</subfield><subfield code="a">1264832374</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783288991</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178328899X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783288981</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783288984</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306545560</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306545563</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)875818937</subfield><subfield code="z">(OCoLC)907234487</subfield><subfield code="z">(OCoLC)994453535</subfield><subfield code="z">(OCoLC)1264832374</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.A65</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, Aditya.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning pentesting for Android /</subfield><subfield code="c">Aditya Gupta.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (176 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Getting started with Android security -- Preparing the battlefield -- Reversing and auditing Android apps -- Traffic analysis for Android devices -- Android forensics -- Playing with SQLite -- Lesser-known Android attacks -- ARM exploitation -- Writing the Pentest report.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This is an easy-to-follow guide, full of hands-on and real-world examples of applications. Each of the vulnerabilities discussed in the book is accompanied with the practical approach to the vulnerability, and the underlying security issue. This book is intended for all those who are looking to get started in Android security or Android application penetration testing. You don't need to be an Android developer to learn from this book, but it is highly recommended that developers have some experience in order to learn how to create secure applications for Android.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Android (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2009043077</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Android (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Design.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95009362</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels d'application</subfield><subfield code="x">Développement.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Learning Pentesting for Android (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXRHvWDKvkWprTKpK3cFJC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Gupta, Aditya.</subfield><subfield code="t">Learning Pentesting for Android.</subfield><subfield code="d">Birmingham : Packt Publishing, 2014</subfield><subfield code="z">9781783288991</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=747088</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1644013</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">747088</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11724429</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn875818937 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:25:53Z |
institution | BVB |
isbn | 9781783288991 178328899X 1783288981 9781783288984 1306545560 9781306545563 |
language | English |
oclc_num | 875818937 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (176 pages) : illustrations. |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Gupta, Aditya. Learning pentesting for Android / Aditya Gupta. Birmingham : Packt Publishing, 2014. 1 online resource (176 pages) : illustrations. text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes index. Getting started with Android security -- Preparing the battlefield -- Reversing and auditing Android apps -- Traffic analysis for Android devices -- Android forensics -- Playing with SQLite -- Lesser-known Android attacks -- ARM exploitation -- Writing the Pentest report. This is an easy-to-follow guide, full of hands-on and real-world examples of applications. Each of the vulnerabilities discussed in the book is accompanied with the practical approach to the vulnerability, and the underlying security issue. This book is intended for all those who are looking to get started in Android security or Android application penetration testing. You don't need to be an Android developer to learn from this book, but it is highly recommended that developers have some experience in order to learn how to create secure applications for Android. English. Print version record. Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Android (Electronic resource) fast Application software Design. Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Logiciels d'application Développement. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Application software Development fast Computer networks Security measures fast has work: Learning Pentesting for Android (Text) https://id.oclc.org/worldcat/entity/E39PCXRHvWDKvkWprTKpK3cFJC https://id.oclc.org/worldcat/ontology/hasWork Print version: Gupta, Aditya. Learning Pentesting for Android. Birmingham : Packt Publishing, 2014 9781783288991 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=747088 Volltext |
spellingShingle | Gupta, Aditya Learning pentesting for Android / Getting started with Android security -- Preparing the battlefield -- Reversing and auditing Android apps -- Traffic analysis for Android devices -- Android forensics -- Playing with SQLite -- Lesser-known Android attacks -- ARM exploitation -- Writing the Pentest report. Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Android (Electronic resource) fast Application software Design. Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Logiciels d'application Développement. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Application software Development fast Computer networks Security measures fast |
subject_GND | http://id.loc.gov/authorities/names/n2009043077 http://id.loc.gov/authorities/subjects/sh95009362 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Learning pentesting for Android / |
title_auth | Learning pentesting for Android / |
title_exact_search | Learning pentesting for Android / |
title_full | Learning pentesting for Android / Aditya Gupta. |
title_fullStr | Learning pentesting for Android / Aditya Gupta. |
title_full_unstemmed | Learning pentesting for Android / Aditya Gupta. |
title_short | Learning pentesting for Android / |
title_sort | learning pentesting for android |
topic | Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077 Android (Electronic resource) fast Application software Design. Application software Development. http://id.loc.gov/authorities/subjects/sh95009362 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Logiciels d'application Développement. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Computer Literacy. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Hardware General. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Reference. bisacsh Application software Development fast Computer networks Security measures fast |
topic_facet | Android (Electronic resource) Application software Design. Application software Development. Computer networks Security measures. Logiciels d'application Développement. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Computer Literacy. COMPUTERS Computer Science. COMPUTERS Data Processing. COMPUTERS Hardware General. COMPUTERS Information Technology. COMPUTERS Machine Theory. COMPUTERS Reference. Application software Development Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=747088 |
work_keys_str_mv | AT guptaaditya learningpentestingforandroid |