Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
Managing the Security Testing Process ◾  187
from a central source (i.e., iTunes, Android app store, etc.) and installed on the device. An MPT
would have to be performed to check for security issues and data leakage on the device. A request
to review the actual source code would be even more thorough in helping to discover any security
issues. However, it is unlikely that the source code would be made available to the testing team. In
this case, the documentation of any QA, UAT, and security testing performed by the developers
would be extremely beneficial.
ere is also a third option that is a hybrid of the previous two solutions. In this scenario, a
customized graphical user interface (GUI) is developed as an application for a mobile plat ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498