- Hands-On Penetration Testing with Kali NetHunter
- Glen D. Singh Sean Philip Oriyano
- 91字
- 2021-07-02 12:38:29
The Android security model
To better understand Android's security posture, we are going to take a look into the security model behind Android. We'll look at how Google and the Android team take the extra steps needed to protect the ecosystem of Android devices and their users.
Securing an open source operating system has its challenges, and Android uses a multi-layered security system to protect its users and the platform. Each Android device usually has a set of security services provided by Google, let's look at some of them.
推薦閱讀
- CTF實(shí)戰(zhàn):技術(shù)、解題與進(jìn)階
- Kali Linux Social Engineering
- 黑客攻防技巧
- Mastering Kali Linux for Advanced Penetration Testing
- Kali Linux Wireless Penetration Testing Cookbook
- Computer Forensics with FTK
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)(第2版)
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- 云原生安全技術(shù)實(shí)踐指南
- Instant Java Password and Authentication Security
- 數(shù)據(jù)安全領(lǐng)域指南
- 網(wǎng)絡(luò)安全應(yīng)急響應(yīng)實(shí)戰(zhàn)
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Kali Linux高級(jí)滲透測(cè)試(原書第4版)
- 網(wǎng)絡(luò)空間安全導(dǎo)論