- Learning Pentesting for Android Devices
- Aditya Gupta
- 284字
- 2021-07-16 12:13:44
Acknowledgments
This book wouldn't be in your hands without the contribution of some of the people who worked day and night to make this a success. First of all, a great thanks to the entire team at Packt Publishing especially Ankita, Nikhil, and Priya, for keeping up with me all the time and helping me with the book in every way possible.
I would also like to thank my family members for motivating me from time to time, and also for taking care of my poor health due to all work and no sleep for months. Thanks Dad, Mom, and Upasana Di.
A special thanks to some of my special friends Harpreet Jolly, Mandal, Baman, Cim Stordal, Rani Rituja, Dev Kar, Palak, Balu Thomas, Silky, and my Rediff Team: Amol, Ramesh, Sumit, Venkata, Shantanu, and Mudit.
I would like to thank Subho Halder and Gaurav Rajora, who were with me from the starting days of my career and helped me during the entire learning phase starting from my college days till today.
Huge thanks to the team at Null Community—a group of extremely talented and hardworking people when it comes to security including Aseem Jakhar, Anant Srivastava, Ajith (r3dsm0k3
), Rahul Sasi, Nishant Das Pattnaik, Riyaz Ahmed, Amol Naik, Manu Zacharia, and Rohit Srivastava. You guys are the best!
And finally the people who deserve all the respect for making Android security what it is today with their contributions, and helping me learn more and more each and every day: Joshua Drake (@jduck
), Justin Case (@TeamAndIRC
), Zuk (@ihackbanme
), Saurik (@saurik
), Pau Olivia (@pof
), Thomas Cannon (@thomas_cannon
), Andrew Hoog, Josh (@p0sixninja
), and Blake, Georgia (@georgiaweidman
).
Also, thanks to all the readers and online supporters.
- 數據恢復方法及案例分析
- Securing Blockchain Networks like Ethereum and Hyperledger Fabric
- 信息系統安全檢測與風險評估
- 網絡安全與攻防入門很輕松(實戰超值版)
- 從實踐中學習密碼安全與防護
- 數據安全與流通:技術、架構與實踐
- 先進云安全研究與實踐
- SQL Injection Strategies
- INSTANT Apple Configurator How-to
- 隱私計算:推進數據“可用不可見”的關鍵技術
- Web前端黑客技術揭秘
- 惡意軟件、Rootkit和僵尸網絡
- Hands-On Spring Security 5 for Reactive Applications
- 網絡設備安全與防火墻
- 網絡安全滲透測試