Mobile Hacker

Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle  eBooks & eLearning

Posted by AlenMiler at Oct. 29, 2016
Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle

Hacking University: Computer Hacking and Mobile Hacking 2 Manuscript Bundle: Essential Beginners Guide on How to Become an Amateur Hacker and Hacking … Android) (Hacking Freedom and Data Driven) by Isaac D. Cody
English | 23 Oct. 2016 | ISBN: 1539713830 | 95 Pages | PDF | 585.49 KB

This is a 2 book bundle related to hacking computers and hacking mobile devices, apps, and game consoles.
Udemy – Become a Mobile App Growth Hacker. Total Theory and Training

Udemy – Become a Mobile App Growth Hacker. Total Theory and Training
MP4 | Video: 1280x720 | 60 kbps | 48 KHz | Duration: 4 Hours | 1.29 GB
Genre: eLearning | Language: English

Complete guide on theory and elite techniques to increase app downloads and increase user retention to maximize profit.

The Mobile Application Hacker's Handbook  

Posted by nebulae at April 5, 2015
The Mobile Application Hacker's Handbook

Dominic Chell and Tyrone Erasmus, "The Mobile Application Hacker's Handbook"
English | ISBN: 1118958500 | 2015 | 816 pages | EPUB | 6 MB

iOS Hacker's Handbook (repost)  

Posted by interes at May 26, 2014
iOS Hacker's Handbook (repost)

iOS Hacker's Handbook by Charlie Miller, Dion Blazakis, Dino DaiZovi and Stefan Esser
English | 2012 | 408 Pages | ISBN: 1118204123 | PDF | 4,7 MB

Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all.

Mobile Prototyping with Axure 7  

Posted by nebulae at May 14, 2014
Mobile Prototyping with Axure 7

Will Hacker, "Mobile Prototyping with Axure 7"
English | ISBN: 1849695148 | 2013 | 118 pages | PDF, EPUB, MOBI | 27 MB

Hacker Evolution (2007)  Games

Posted by star07 at July 29, 2007
Hacker Evolution (2007)

Hacker Evolution (2007) | 33Mb

From the creators of a successful hacker games series (Digital Hazard, BS Hacker, etc) Hacker Evolution is a new hacking simulation game, featuring unparalleled graphics and features.You play the role of a former intelligence agent, specializing in computer security. When a chain of events sets off worldwide, leaving critical service disabled, you assume the role a computer hacker to find out what happened and attempt to stop it. When a stock market, a central bank, satellite uplink and transoceanic fiber optics links crash, you know this is more then a simple event. Something big is behind all this, and you have to figure out what is it. You hack into computers, look for exploits and information, steal money to buy hardware upgrades in an attempt to put all the pieces of a big puzzle, together. Set in a virtual operating system environment, the game is packed with all the features required to bring the hacker feeling and experience to every gamer. The concept behind Hacker Evolution is to create a game that challenges the gamer's intelligence, attention and focus, creating a captivating mind game. Solve puzzles, examine code and bits of information, to help you achieve your objectives.

CEH Certified Ethical Hacker Practice Exams, Third Edition  eBooks & eLearning

Posted by Bayron at Dec. 10, 2016
CEH Certified Ethical Hacker Practice Exams, Third Edition

CEH Certified Ethical Hacker Practice Exams, Third Edition by Matt Walker
English | 2016 | ISBN: 1259836606 | 352 pages | EPUB | 5 MB
Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation

Lee Reiber, "Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation"
English | ISBN: 0071843639 | 2016 | EPUB | 480 pages | 22,4 MB
Mobile, Secure, and Programmable Networking: Second International Conference, MSPN 2016

Mobile, Secure, and Programmable Networking: Second International Conference, MSPN 2016
Springer | 3 Jan. 2017 | English | ISBN: 3319504622 | 236 pages | PDF | 18 Mb
Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust)

Protecting Mobile Networks and Devices: Challenges and Solutions (Series in Security, Privacy and Trust) by Weizhi Meng
English | 5 Jan. 2017 | ISBN: 1498735835 | 332 Pages | PDF | 15.44 MB

This book gathers and analyzes the latest attacks, solutions, and trends in mobile networks. Its broad scope covers attacks and solutions related to mobile networks, mobile phone security, and wireless security. It examines the previous and emerging attacks and solutions in the mobile networking worlds, as well as other pertinent security issues. The many attack samples present the severity of this problem, while the delivered methodologies and countermeasures show how to build a truly secure mobile computing environment.