舉報

會員
Android Application Security Essentials
最新章節:
Index
AndroidApplicationSecurityEssentialsispackedwithexamples,screenshots,illustrations,andrealworldusecasestosecureyourappstherightway.Ifyouarelookingforguidanceanddetailedinstructionsonhowtosecureappdata,thenthisbookisforyou.Developers,architects,managers,andtechnologistswhowishtoenhancetheirknowledgeofAndroidsecuritywillfindthisbookinteresting.SomepriorknowledgeofdevelopmentontheAndroidstackisdesirablebutnotrequired.
目錄(78章)
倒序
- 封面
- 版權信息
- Credits
- Foreword
- About the Author
- About the Reviewer
- www.PacktPub.com
- Preface
- Chapter 1. The Android Security Model – the Big Picture
- Installing with care
- Android platform architecture
- Application signing
- Data storage on the device
- Crypto APIs
- Device Administration
- Summary
- Chapter 2. Application Building Blocks
- Application components
- Intents
- Summary
- Chapter 3. Permissions
- Permission protection levels
- Application level permissions
- Component level permissions
- Extending Android permissions
- Summary
- Chapter 4. Defining the Application's Policy File
- The AndroidManifest.xml file
- Application policy use cases
- Example checklist
- Summary
- Chapter 5. Respect Your Users
- Principles of data security
- Identifying assets threats and attacks
- End-to-end security
- Digital rights management
- Summary
- Chapter 6. Your Tools – Crypto APIs
- Terminology
- Security providers
- Random number generation
- Hashing functions
- Public key cryptography
- Symmetric key cryptography
- Message Authentication Codes
- Summary
- Chapter 7. Securing Application Data
- Data storage decisions
- User preferences
- File
- Cache
- Database
- Account manager
- SSL/TLS
- Installing an application on an external storage
- Summary
- Chapter 8. Android in the Enterprise
- The basics
- Understanding the Android ecosystem
- Device administration capabilities
- Next steps
- Summary
- Chapter 9. Testing for Security
- Testing overview
- Security testing basics
- Sample test case scenarios
- Security testing the resources
- Summary
- Chapter 10. Looking into the Future
- Mobile commerce
- Proximity technologies
- Social networking
- Healthcare
- Authentication
- Advances in hardware
- Application architecture
- Summary
- Index 更新時間:2021-08-13 16:25:44
推薦閱讀
- 數據恢復方法及案例分析
- 計算機網絡安全技術(第6版·慕課版)
- Learning Python for Forensics
- 特種木馬防御與檢測技術研究
- 暗戰亮劍:黑客滲透與防御全程實錄
- Penetration Testing with Perl
- 安全技術運營:方法與實踐
- 反黑命令與攻防從新手到高手(微課超值版)
- 網絡安全三十六計:人人該懂的防黑客技巧
- 可信計算3.0工程初步(第二版)
- 白話零信任
- Mastering Metasploit
- 功能型密碼算法設計與分析
- 黑客攻擊與防范實戰從入門到精通
- Practical Internet of Things Security
- 紅藍攻防:技術與策略(原書第3版)
- Kali Linux無線網絡滲透測試詳解
- 網絡空間安全實踐能力分級培養(I)
- Web安全與攻防實戰從新手到高手(微課超值版)
- 從實踐中學習Fiddler Web應用分析
- Hands-On Application Penetration Testing with Burp Suite
- 云安全:安全即服務
- 信息安全風險管理與實踐
- 應用軟件安全代碼審查指南(新型網絡安全人才培養叢書)
- 美國網絡安全戰略與政策二十年
- Burp Suite Cookbook
- FreeRTOS內核實現與應用開發實戰指南:基于STM32
- 互聯網安全建設從0到1
- 天地一體化信息網絡信息安全保障技術
- 博弈論與數據保護