Item Details

Android Security [electronic resource]: Attacks and Defenses

authors, Anmol Misra, Abhishek Dubey
Format
EBook; Book; Online
Published
Boca Raton : Taylor & Francis, 2013.
Language
English
ISBN
9781439896464 (hardback)
Summary
"Preface xvi Android Security: Attacks and Defenses Audience Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. Support Errata and support for this book are available on the CRC Press website and on our site: www.androidinsecurity.com. Our site will also have downloads for applications and tools created by the user. Sample applications created by the authors are available on our website under the Resource section. Readers should download apk files from our website and use them in conjunction with the text, wherever needed. Username: android Password: ISBN-10 number of the book--1439896461 Structure Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of"--
Description
Mode of access: World wide Web.
Notes
Includes bibliographical references and index.
Logo for Copyright Not EvaluatedCopyright Not Evaluated
Technical Details
  • Access in Virgo Classic

  • LEADER 03092nam a2200373 i 4500
    001 u6429518
    003 SIRSI
    005 20141122114644.0
    006 m d
    007 cr n
    008 130313s2013 flua sb 001 0 eng d
    010
      
      
    a| 2013008016
    020
      
      
    a| 9781439896464 (hardback)
    035
      
      
    a| (WaSeSS)ssj0000876649
    040
      
      
    a| DLC b| eng c| DLC d| DLC d| WaSeSS
    042
      
      
    a| pcc
    050
    0
    0
    a| QA76.774.A53 b| M57 2013
    082
    0
    0
    a| 005.8 2| 23
    084
      
      
    a| COM043000 a| COM051230 a| COM053000 2| bisacsh
    100
    1
      
    a| Misra, Anmol.
    245
    1
    0
    a| Android security h| [electronic resource] : b| attacks and defenses / c| authors, Anmol Misra, Abhishek Dubey.
    260
      
      
    a| Boca Raton : b| Taylor & Francis, c| 2013.
    504
      
      
    a| Includes bibliographical references and index.
    520
      
      
    a| "Preface xvi Android Security: Attacks and Defenses Audience Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. Support Errata and support for this book are available on the CRC Press website and on our site: www.androidinsecurity.com. Our site will also have downloads for applications and tools created by the user. Sample applications created by the authors are available on our website under the Resource section. Readers should download apk files from our website and use them in conjunction with the text, wherever needed. Username: android Password: ISBN-10 number of the book--1439896461 Structure Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of"-- c| Provided by publisher.
    538
      
      
    a| Mode of access: World wide Web.
    630
    0
    0
    a| Android (Electronic resource)
    650
      
    0
    a| Operating systems (Computers) x| Security measures.
    650
      
    0
    a| Smartphones x| Security measures.
    650
      
    0
    a| Mobile computing x| Security measures.
    655
      
    0
    a| Electronic books.
    710
    2
      
    a| Safari Books Online
    856
    4
    0
    u| http://RE5QY4SB7X.search.serialssolutions.com/?V=1.0&L=RE5QY4SB7X&S=JCs&C=TC0000876649&T=marc
    596
      
      
    a| 1
    999
      
      
    a| XX(6429518.1) w| WEB i| 6429518-1001 l| INTERNET m| UVA-LIB t| INTERNET

Availability

Google Preview

Read Online