Android security attacks and defenses
Preface xvi Android Security: Attacks and Defenses Audience Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton :
CRC Press, Taylor & Francis Group
[2013]
|
Edición: | 1st edition |
Colección: | Gale eBooks
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628730906719 |
Tabla de Contenidos:
- Front Cover; Android Security: Attacks and Defenses; Copyright; Dedication; Table of Contents; Foreword; Preface; About the Authors; Acknowledgments; 1. Introduction; 2. Android Architecture; 3. Android Application Architecture; 4. Android (in)Security; 5. Pen Testing Android; 6. Reverse Engineering Android Applications; 7. Modifying the Behavior of Android Applications without Source Code; 8. Hacking Android; 9. Securing Android for the Enterprise Environment; 10. Browser Security and Future Threat Landscape; Appendix A; Appendix B: JEB Disassembler and Decompiler Overview
- Appendix C: Cracking the SecureApp.Apk ApplicationGlossary; Back Cover