跳至内容
Application security for the Android platform 線上預覽
關閉線上預覽
正在查...

Application security for the Android platform

作者: Jeff Six
出版商: Sebastopol : O'Reilly Media, ©2012.
版本/格式:   電子書 : 文獻 : 英語 : 1st ed所有版本和格式的總覽
資料庫:WorldCat
提要:
"With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's opportunity to compromise your app and steal user data. How is the Android  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

類型/形式: Electronic books
其他的實體格式: Print version:
Six, Jeff.
Application Security for the Android Platform.
Sebastopol : O'Reilly Media, c2012
(OCoLC)759176164
資料類型: 文獻, 網際網路資源
文件類型: 網路資源, 電腦資料
所有的作者/貢獻者: Jeff Six
ISBN: 9781449322281 144932228X 9781449322274 1449322271
OCLC系統控制編碼: 768082313
注意: "Processes, permissions, and other safeguards"--Cover.
描述: 1 online resource (x, 97 p.)
内容: Chapter 1. Introduction. Application Security: Why You Should Care; The Current State of Mobile Application Security on Android; Security: Risk = Vulnerability + Threat + Consequences; Evolution of Information Security: Why Applications Matter the Most; Your Role: Protect the Data; Secure Software Development Techniques; Unique Characteristics of Android; Moving On --
Chapter 2. Android Architecture. Introduction to the Android Architecture; The Linux Security Model; The Resulting Android Security Model; Application Signing, Attribution, and Attestation; Process Design; Android Filesystem Isolation; Android Preferences and Database Isolation; Moving up the Layers to System API and Component Permissions --
Chapter 3. Application Permissions. Android Permission Basics; Using Restricted System APIs and the User Experience; Custom Permissions --
Chapter 4. Component Security and Permissions. The Types of Android Components; Intercomponent Signaling Using Intents; Public and Private Components; Imposing Restrictions on Access to ComponentsSecuring Activities; Securing Services; Securing Content Providers; Securing Broadcast Intents; Putting It All Together: Securing Communications in a Multi-Tier App --
Chapter 5. Protecting Stored Data. The Threats and Vulnerabilities Against Stored Data; Vulnerabilities of Stored Data; Threats to, and Mitigations for, Stored Data; Protection Principles; Cryptography Primer: Encryption; Symmetric Encryption; Asymmetric Key Encryption; Cryptography Primer: Hashing; Cryptographic Practicalities; Computational Infeasibility; Algorithm Choice and Key SizeCipher Operation Modes, Initialization Vectors, and Salt; Public Keys and Their Management; Key Derivation and Management; Motivation; Key Derivation; Encryption Without User-Supplied Key Derivation; Practical Cryptography: Applying a Technique Against a Threat --
Chapter 6. Securing Server Interactions. Confidentiality and Authentication; SSL/TLS: The Industry Standard; Authentication of the Entities; Encryption of Data; Protecting Data En Route to Public Services; Introducing the Android SSL/TLS Environment; Server Verification; Handling SSL/TLS Connection Errors; Protecting Data En Route to Private ServicesUsing Only Specific Certificates for SSL/TLS; One Step Further: Using Client-Side Authentication SSL/TLS; Threats Against Devices Using Data in Transit; Input Validation: The Central Tenant of Application Security; Reject-Known-Bad; Accept-Known-Good; Wrapping It Up: Input Validation; Preventing Command Injection --
Chapter 7. Summary. Key Themes; It's All About Risk; The Principle of Least Privilege; Use the Permissions System; Android Is an Open Architecture; Get the Cryptography Right; Never Trust User Input; Wrapping It Up.
責任: Jeff Six.

摘要:

"With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's opportunity to compromise your app and steal user data. How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you'll learn how to address real threats to your app, whether or not you have previous experience with security issues"--Publisher.

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

成爲第一個
確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


<http://www.worldcat.org/oclc/768082313>
library:oclcnum"768082313"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/768082313>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:bookEdition"1st ed."
schema:bookFormatschema:EBook
schema:copyrightYear"2012"
schema:creator
schema:datePublished"2012"
schema:description"Chapter 1. Introduction. Application Security: Why You Should Care; The Current State of Mobile Application Security on Android; Security: Risk = Vulnerability + Threat + Consequences; Evolution of Information Security: Why Applications Matter the Most; Your Role: Protect the Data; Secure Software Development Techniques; Unique Characteristics of Android; Moving On --"@en
schema:description""With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You'll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker's opportunity to compromise your app and steal user data. How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you'll learn how to address real threats to your app, whether or not you have previous experience with security issues"--Publisher."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1088327799>
schema:genre"Electronic books."@en
schema:inLanguage"en"
schema:name"Application security for the Android platform"@en
schema:numberOfPages"97"
schema:publisher
schema:url<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=415627>
schema:url<http://proquestcombo.safaribooksonline.com/9781449322250>
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={686BEDBE-2F80-4D63-BE1A-2334F269EC5B}&Format=50>
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={686BEDBE-2F80-4D63-BE1A-2334F269EC5B}&Format=410>
schema:url
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={686BEDBE-2F80-4D63-BE1A-2334F269EC5B}&Format=420>
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={686BEDBE-2F80-4D63-BE1A-2334F269EC5B}&Format=810>
schema:url<http://www.contentreserve.com/TitleInfo.asp?ID={686BEDBE-2F80-4D63-BE1A-2334F269EC5B}&Format=450>
schema:url<http://public.eblib.com/EBLPublic/PublicView.do?ptiID=816394>
schema:workExample
schema:workExample

Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.