000 02960cmm a2200277 a 4500
001 46765
003 IN-BdCUP
005 20230426175556.0
008 230426s2023 u eng
020 _a9781439896471
040 _beng
_cIN-BdCUP
041 _aeng
082 _a005.800
_bM678
100 _aDubey, Abhishek
245 0 _aAndroid security :
_battacks and defenses /
_cAbhishek Dubey, Anmol Misra
260 _aBoca Raton :
_bTaylor & Francis,
_c2013
300 _a1 online resource (xx, 255 pages)
505 _ach. 1. Introduction -- ch. 2. Android architecture -- ch. 3. Android application architecture -- ch. 4. Android (in)security -- ch. 5. Pen testing Android -- ch. 6. Reverse engineering Android applications -- ch. 7. Modifying the behavior of Android applications without source code -- ch. 8. Hacking Android -- ch. 9. Securing Android for the enterprise environment -- ch. 10. Browser security and future threat landscape
520 _aPreface xvi Android Security: Attacks and Defenses Audience Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. Support Errata and support for this book are available on the CRC Press website and on our site: www.androidinsecurity.com. Our site will also have downloads for applications and tools created by the user. Sample applications created by the authors are available on our website under the Resource section. Readers should download apk files from our website and use them in conjunction with the text, wherever needed. Username: android Password: ISBN-10 number of the book--1439896461 Structure Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of
650 _aOperating systems (computers)
650 _aMobile computing
650 _aSmartphones
700 _aMisra, Anmol
856 _3Electronic Book Resource
_uhttps://www.taylorfrancis.com/books/9781439896471
942 _2ddc
_cE
999 _c48775
_d48775