000 03219cam a2200385 i 4500
001 17657992
005 20240619144939.0
008 180220s2013 flua b 001 0 eng
010 _a 2013008016
020 _a9781439896464
_q(hardback)
_cGBP44.99
040 _aDLC
_beng
_cDLC
_erda
_dDLC
_dSFPAGOH
050 0 0 _aQA76.774.A53
_bM678 2013
100 1 _aMisra, Anmol.
_eauthor
245 1 0 _aAndroid security :
_battacks and defenses /
_cauthors, Anmol Misra, Abhishek Dubey.
264 1 _aBoca Raton :
_bCRC Press, Taylor & Francis,
_c2013.
300 _axx, 255 pages :
_billustrations ;
_c25 cm
336 _atext
_2rdacontent
337 _aunmediated
_2rdamedia
338 _avolume
_2rdacarrier
520 _a"Preface xvi Android Security: Attacks and Defenses Audience Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. Support Errata and support for this book are available on the CRC Press website and on our site: www.androidinsecurity.com. Our site will also have downloads for applications and tools created by the user. Sample applications created by the authors are available on our website under the Resource section. Readers should download apk files from our website and use them in conjunction with the text, wherever needed. Username: android Password: ISBN-10 number of the book--1439896461 Structure Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of"--
_cProvided by publisher.
504 _aIncludes bibliographical references and index.
630 0 0 _aAndroid (Electronic resource)
650 0 _aOperating systems (Computers)
_xSecurity measures.
650 0 _aSmartphones
_xSecurity measures.
650 0 _aMobile computing
_xSecurity measures.
650 7 _aCOMPUTERS / Networking / General
_2bisacsh.
650 7 _aCOMPUTERS / Software Development & Engineering / General
_2bisacsh.
650 7 _aCOMPUTERS / Security / General
_2bisacsh.
907 _a.b10061757
_b19-08-19
_c31-12-17
998 _am
_b31-12-17
_cm
_da
_e-
_feng
_gflu
_h0
999 _c3770
_d3770