Android security : (Record no. 48775)

MARC details
000 -LEADER
fixed length control field 02960cmm a2200277 a 4500
001 - CONTROL NUMBER
control field 46765
003 - CONTROL NUMBER IDENTIFIER
control field IN-BdCUP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230426175556.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230426s2023 u eng
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439896471
040 ## - CATALOGING SOURCE
Language of cataloging eng
Transcribing agency IN-BdCUP
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.800
Item number M678
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Dubey, Abhishek
245 #0 - TITLE STATEMENT
Title Android security :
Remainder of title attacks and defenses /
Statement of responsibility, etc. Abhishek Dubey, Anmol Misra
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boca Raton :
Name of publisher, distributor, etc. Taylor & Francis,
Date of publication, distribution, etc. 2013
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xx, 255 pages)
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note ch. 1. Introduction -- ch. 2. Android architecture -- ch. 3. Android application architecture -- ch. 4. Android (in)security -- ch. 5. Pen testing Android -- ch. 6. Reverse engineering Android applications -- ch. 7. Modifying the behavior of Android applications without source code -- ch. 8. Hacking Android -- ch. 9. Securing Android for the enterprise environment -- ch. 10. Browser security and future threat landscape
520 ## - SUMMARY, ETC.
Summary, etc. Preface xvi Android Security: Attacks and Defenses Audience Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. Support Errata and support for this book are available on the CRC Press website and on our site: www.androidinsecurity.com. Our site will also have downloads for applications and tools created by the user. Sample applications created by the authors are available on our website under the Resource section. Readers should download apk files from our website and use them in conjunction with the text, wherever needed. Username: android Password: ISBN-10 number of the book--1439896461 Structure Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Operating systems (computers)
Topical term or geographic name entry element Mobile computing
Topical term or geographic name entry element Smartphones
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Misra, Anmol
856 ## - ELECTRONIC LOCATION AND ACCESS
Materials specified Electronic Book Resource
Uniform Resource Identifier <a href="https://www.taylorfrancis.com/books/9781439896471">https://www.taylorfrancis.com/books/9781439896471</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type E-Book
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Total checkouts Full call number Barcode Date last seen Uniform resource identifier Bill Date Koha item type
    Dewey Decimal Classification     Ranganathan Library Ranganathan Library 07/04/2022 Taylor & Francis   005.800 M678 E01369 26/04/2023 https://www.taylorfrancis.com/books/9781439896471 07/04/2022 E-Book
This system is made operational by the in-house staff of the CUP Library.