Proven methodologies, technical rigor, and from-the-trenches experience to countering mobile security exploits-from the bestselling coauthor of the original Hacking Exposed Hacking Exposed Mobile focuses on the security of applications running on mobile devices, specifically mobile phones. This boo[...]