reklama - zainteresowany?

Application Security for the Android Platform. Processes, Permissions, and Other Safeguards - Helion

Application Security for the Android Platform. Processes, Permissions, and Other Safeguards
ebook
Autor: Jeff Six
ISBN: 978-14-493-2227-4
stron: 114, Format: ebook
Data wydania: 2011-12-01
Księgarnia: Helion

Cena książki: 55,24 zł (poprzednio: 64,99 zł)
Oszczędzasz: 15% (-9,75 zł)

Dodaj do koszyka Application Security for the Android Platform. Processes, Permissions, and Other Safeguards

Tagi: Android | FLEX | Inne

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.

How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you’ll learn how to address real threats to your app, whether or not you have previous experience with security issues.

  • Examine Android’s architecture and security model, and how it isolates the filesystem and database
  • Learn how to use Android permissions and restricted system APIs
  • Explore Android component types, and learn how to secure communications in a multi-tier app
  • Use cryptographic tools to protect data stored on an Android device
  • Secure the data transmitted from the device to other parties, including the servers that interact with your app

Dodaj do koszyka Application Security for the Android Platform. Processes, Permissions, and Other Safeguards

 

Osoby które kupowały "Application Security for the Android Platform. Processes, Permissions, and Other Safeguards", wybierały także:

  • Kotlin w praktyce. Kurs video. Tworzenie aplikacji webowych za pomocÄ… Spring Boota
  • Platforma Xamarin. Kurs video. Poziom drugi. Zaawansowane techniki tworzenia aplikacji cross-platform
  • Android Studio. Kurs video. NarzÄ™dzia Android developera
  • Android. Techniki efektywnej pracy. Kurs video. Poziom pierwszy. Skróty klawiszowe i biblioteki
  • Testowanie aplikacji mobilnych na platformÄ™ Android. Kurs video. Poziom pierwszy. Testy jednostkowe i UI

Dodaj do koszyka Application Security for the Android Platform. Processes, Permissions, and Other Safeguards

Spis treści

Application Security for the Android Platform. Processes, Permissions, and Other Safeguards eBook -- spis treści

  • Application Security for the Android Platform
    • SPECIAL OFFER: Upgrade this ebook with OReilly
    • Preface
      • Organization of the Book
      • Conventions Used in This Book
      • Using Code Examples
      • Safari Books Online
      • How to Contact Us
      • Acknowledgments
    • 1. Introduction
      • Application Security: Why You Should Care
      • The Current State of Mobile Application Security on Android
      • Security: Risk = Vulnerability + Threat + Consequences
      • Evolution of Information Security: Why Applications Matter the Most
      • Your Role: Protect the Data
      • Secure Software Development Techniques
      • Unique Characteristics of Android
      • Moving On
    • 2. Android Architecture
      • Introduction to the Android Architecture
      • The Linux Security Model
      • The Resulting Android Security Model
      • Application Signing, Attribution, and Attestation
      • Process Design
      • Android Filesystem Isolation
      • Android Preferences and Database Isolation
      • Moving up the Layers to System API and Component Permissions
    • 3. Application Permissions
      • Android Permission Basics
      • Using Restricted System APIs and the User Experience
      • Custom Permissions
    • 4. Component Security and Permissions
      • The Types of Android Components
      • Intercomponent Signaling Using Intents
      • Public and Private Components
      • Imposing Restrictions on Access to Components
        • Securing Activities
        • Securing Services
        • Securing Content Providers
        • Securing Broadcast Intents
      • Putting It All Together: Securing Communications in a Multi-Tier App
    • 5. Protecting Stored Data
      • The Threats and Vulnerabilities Against Stored Data
        • Vulnerabilities of Stored Data
        • Threats to, and Mitigations for, Stored Data
      • Protection Principles
      • Cryptography Primer: Encryption
        • Symmetric Encryption
        • Asymmetric Key Encryption
      • Cryptography Primer: Hashing
      • Cryptographic Practicalities
        • Computational Infeasibility
        • Algorithm Choice and Key Size
        • Cipher Operation Modes, Initialization Vectors, and Salt
        • Public Keys and Their Management
      • Key Derivation and Management
        • Motivation
        • Key Derivation
        • Encryption Without User-Supplied Key Derivation
      • Practical Cryptography: Applying a Technique Against a Threat
    • 6. Securing Server Interactions
      • Confidentiality and Authentication
      • SSL/TLS: The Industry Standard
        • Authentication of the Entities
        • Encryption of Data
      • Protecting Data En Route to Public Services
        • Introducing the Android SSL/TLS Environment
        • Server Verification
        • Handling SSL/TLS Connection Errors
      • Protecting Data En Route to Private Services
        • Using Only Specific Certificates for SSL/TLS
        • One Step Further: Using Client-Side Authentication SSL/TLS
      • Threats Against Devices Using Data in Transit
      • Input Validation: The Central Tenant of Application Security
        • Reject-Known-Bad
        • Accept-Known-Good
        • Wrapping It Up: Input Validation
      • Preventing Command Injection
    • 7. Summary
      • Key Themes
        • Its All About Risk
        • The Principle of Least Privilege
        • Use the Permissions System
        • Android Is an Open Architecture
        • Get the Cryptography Right
        • Never Trust User Input
      • Wrapping It Up
    • About the Author
    • SPECIAL OFFER: Upgrade this ebook with OReilly

Dodaj do koszyka Application Security for the Android Platform. Processes, Permissions, and Other Safeguards

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.