Android Security Cookbook
Keith Makan
Vendu par THE SAINT BOOKSTORE, Southport, Royaume-Uni
Vendeur AbeBooks depuis 14 juin 2006
Neuf(s) - Couverture souple
Etat : New
Quantité disponible : Plus de 20 disponibles
Ajouter au panierVendu par THE SAINT BOOKSTORE, Southport, Royaume-Uni
Vendeur AbeBooks depuis 14 juin 2006
Etat : New
Quantité disponible : Plus de 20 disponibles
Ajouter au panierThis item is printed on demand. New copy - Usually dispatched within 5-9 working days 643.
N° de réf. du vendeur C9781782167167
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Overview
In Detail
Android Security Cookbook discusses many common vulnerabilities and security related shortcomings in Android applications and operating systems. The book breaks down and enumerates the processes used to exploit and remediate these vulnerabilities in the form of detailed recipes and walkthroughs.
The book also teaches readers to use an Android Security Assessment Framework called Drozer and how to develop plugins to customize the framework.
Other topics covered include how to reverse-engineer Android applications to find common vulnerabilities, and how to find common memory corruption vulnerabilities on ARM devices. In terms of application protection this book will show various hardening techniques to protect application components, the data stored, secure networking. In summary, Android Security Cookbook provides a practical analysis into many areas of Android application and operating system security and gives the
What you will learn from this book
Approach
"Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.
Who this book is written for
"Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from reading this book.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Visitez la page d’accueil du vendeur
Please order through the Abebooks checkout. We only take orders through Abebooks - We don't take direct orders by email or phone.
Refunds or Returns: A full refund of the purchase price will be given if returned within 30 days in undamaged condition.
As a seller on abebooks we adhere to the terms explained at http://www.abebooks.co.uk/docs/HelpCentral/buyerIndex.shtml - if you require further assistance please email us at orders@thesaintbookstore.co.uk
Most orders usually ship within 1-3 business days, but some can take up to 7 days.