Android Security Cookbook
Keith Makan; Scott Alexander-Bown
Vendu par Best Price, Torrance, CA, Etats-Unis
Vendeur AbeBooks depuis 30 août 2024
Neuf(s) - Couverture souple
Etat : Neuf
Quantité disponible : 2 disponible(s)
Ajouter au panierVendu par Best Price, Torrance, CA, Etats-Unis
Vendeur AbeBooks depuis 30 août 2024
Etat : Neuf
Quantité disponible : 2 disponible(s)
Ajouter au panierSUPER FAST SHIPPING.
N° de réf. du vendeur 9781782167167
Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions
Overview
In Detail
Android Security Cookbook discusses many common vulnerabilities and security related shortcomings in Android applications and operating systems. The book breaks down and enumerates the processes used to exploit and remediate these vulnerabilities in the form of detailed recipes and walkthroughs.
The book also teaches readers to use an Android Security Assessment Framework called Drozer and how to develop plugins to customize the framework.
Other topics covered include how to reverse-engineer Android applications to find common vulnerabilities, and how to find common memory corruption vulnerabilities on ARM devices. In terms of application protection this book will show various hardening techniques to protect application components, the data stored, secure networking. In summary, Android Security Cookbook provides a practical analysis into many areas of Android application and operating system security and gives the
What you will learn from this book
Approach
"Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.
Who this book is written for
"Android Security Cookbook" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from reading this book.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Visitez la page d’accueil du vendeur
When you see an item on our listing, it means we have it available in one of our warehouses right here right now, ready for same day or next day processing of your order. Over 50+ Million books in stock & ready to ship same day. Customer Service is a top priority for us, we want every customer to be 100% satisfied. We offer the world's largest selection of books, music and video. Maintaining an accurate inventory of more than 50+ Million items, we are able to ship your order the same day it is r...
SUPER FAST SHIPPING!
Quantité commandée | 20 à 30 jours ouvrés | 15 à 25 jours ouvrés |
---|---|---|
Premier article | EUR 25.55 | EUR 85.19 |
Les délais de livraison sont fixés par les vendeurs et varient en fonction du transporteur et du lieu. Les commandes transitant par les douanes peuvent être retardées et les acheteurs sont responsables de tous les droits ou frais associés. Les vendeurs peuvent vous contacter au sujet de frais supplémentaires afin de couvrir toute augmentation des coûts d'expédition de vos articles.