Skip to content
Permalink
Branch: master
Find file Copy path
Find file Copy path
Fetching contributors…
Cannot retrieve contributors at this time
210 lines (125 sloc) 5.24 KB

Books

Hacking Android

by Srinivasa Rao Kotipalli, Mohammed A. Imran (2016)

http://www.amazon.com/dp/1785883143/

Mobile Forensic Investigations: A Guide to Evidence Collection, Analysis, and Presentation

by Lee Reiber (2016)

http://www.amazon.com/dp/0071843639/

iOS Forensics Cookbook

by Bhanu Birani, Mayank Birani (2016)

http://www.amazon.com/dp/1783988460/

Learning iOS Penetration Testing

by Swaroop Yermalkar (2016)

http://www.amazon.com/dp/1785883259/

iOS Application Security: The Definitive Guide for Hackers and Developers

by David Thiel (2016)

http://www.amazon.com/dp/159327601X/

Learning iOS Forensics

by Mattia Epifani, Pasquale Stirparo (2015)

http://www.amazon.com/dp/1783553510/

Learning Android Forensics

by Rohit Tamma, Donnie Tindall (2015)

http://www.amazon.com/dp/1782174575/

Learning iOS Security

by Allister Banks, Charles S. Edge (2015)

http://www.amazon.com/dp/1783551747/

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework

by Henry Dalziel, Ajin Abraham (2015)

http://www.amazon.com/dp/0128047186/

Exploring SE for Android

by William Confer and William Roberts (2015)

http://www.amazon.com/dp/1784390593/

The Mobile Application Hacker's Handbook

by Dominic Chell, Tyrone Erasmus, Shaun Colley and Ollie Whitehouse(2015)

http://www.amazon.com/dp/1118958500/

Learning Pentesting for Android Devices

by Aditya Gupta (2014)

http://www.amazon.com/dp/1783288981/

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales and Tim Strazzere (2014)

http://www.amazon.com/dp/1482252198/

Practical Mobile Forensics

by Satish Bommisetty, Rohit Tamma and Heather Mahalik (2014)

http://www.amazon.com/dp/1783288310/

Android Security (and Not) Internals

by Yury Zhauniarovich (2014)

http://www.zhauniarovich.com/files/asani/asani.pdf

Android Internals: A Confectioner's Cookbook

by Jonathan Levin (2014)

http://newandroidbook.com/

Android Security Internals

by Nikolay Elenkov (2014)

http://www.amazon.com/dp/1593275811/

Practical Mobile Forensics Paperback

by Satish Bommisetty, Rohit Tamma, Heather Mahalik (2014)

http://www.amazon.com/dp/1783288310/

Android Hacker's Handbook

by Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley and Georg Wicherski (2014)

http://www.amazon.com/dp/111860864X/

Android Security Cookbook

by Keith Makan , Scott Alexander-Bown (2013)

http://www.amazon.com/dp/1782167161/

Android Malware

by Xuxian Jiang and Yajin Zhou (2013)

http://www.amazon.com/dp/1461473934/

Android Application Security Essentials

by Pragati Rai (2013)

http://www.amazon.com/dp/1849515603/

Hacking Exposed Mobile Security Secrets & Solutions

by Neil Bergman, etc al (2013)

http://www.amazon.com/dp/0071817018/

Android Security: Attacks and Defenses

by Anmol Misra and Abhishek Dubey (2013)

http://www.amazon.com/dp/1439896461/

http://androidinsecurity.com

Android软件安全与逆向分析

by 丰生强 (2013)

http://www.amazon.cn/dp/B00BMTVUGG/

Mobile Phone Security and Forensics: A Practical Approach

by I.I. Androulidakis (2012)

http://www.amazon.com/dp/1461416493/

Android Apps Security

by Sheran Gunasekera (2012)

http://www.amazon.com/dp/1430240628

XDA Developers' Android Hacker's Toolkit

by Jason Tyler and Will Verduzco (2012)

http://www.amazon.com/dp/1119951380/

Decompiling Android

by Godfrey Nolan (2012)

http://www.amazon.com/dp/1430242485/

iOS Hacker's Handbook

by Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo Iozzo and Ralf-Philipp Weinmann (2012)

http://www.amazon.com/dp/1118204123/

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

by Jonathan Zdziarski (2012)

http://www.amazon.com/dp/1449318746/

Mobile Application Security

by Himanshu Dwivedi, Chris Clark and David Thiel (2012)

http://www.amazon.com/dp/0071633561/

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

by Andrew Hoog (2011)

http://www.amazon.com/dp/1597496510/

Application Security for the Android Platform: Processes, Permissions, and Other Safeguards

by Jeff Six (2011)

http://www.amazon.com/dp/1449315070/

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

by Andrew Hoog, Katie Strzempka (2011)

http://www.amazon.com/dp/1597496596/

Android Security 安全なアプリケーションを作成するために

by タオソフトウェア株式会社 (2011)

http://www.amazon.co.jp/dp/4844331345/

iOS Forensic Analysis: for iPhone, iPad and iPod Touch

by Sean Morrissey (2010)

http://www.amazon.com/dp/1430233427/

Embedded Java Security: Security for Mobile Devices

by Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua (2010)

http://www.amazon.com/dp/1849966230/

Professional Cocoa Application Security

by Graham J. Lee (2010)

http://www.amazon.com/dp/0470525959/

Mobile Malware Attacks and Defense

by Ken Dunham (2008)

http://www.amazon.com/dp/1597492981/

iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets

by Jonathan Zdziarski (2008)

http://www.amazon.com/dp/0596153589/

You can’t perform that action at this time.