Application Security for the Android Platform : Processes, Permissions, and Other Safeguards - Jeff Six

eTEXT

Application Security for the Android Platform

Processes, Permissions, and Other Safeguards

By: Jeff Six

eText | 1 December 2011 | Edition Number 1

At a Glance

eText


$17.59

or 4 interest-free payments of $4.40 with

Instant online reading in your Booktopia eTextbook Library *

Read online on
Desktop
Tablet
Mobile

Not downloadable to your eReader or an app

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. You’ll learn how to identify and manage the risks inherent in your design, and work to minimize a hacker’s opportunity to compromise your app and steal user data.

How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, you’ll learn how to address real threats to your app, whether or not you have previous experience with security issues.

  • Examine Android’s architecture and security model, and how it isolates the filesystem and database
  • Learn how to use Android permissions and restricted system APIs
  • Explore Android component types, and learn how to secure communications in a multi-tier app
  • Use cryptographic tools to protect data stored on an Android device
  • Secure the data transmitted from the device to other parties, including the servers that interact with your app
Read online on
Desktop
Tablet
Mobile

More in Computer Viruses

Learning ParrotOS - Arvin Destar

eBOOK

Industrial Cybersecurity - Anand Shinde

eBOOK

Defense in Depth - Qasim

eBOOK

$39.99

El Plan Cibernetico - Andre Edmond

eBOOK

Cyber Threat Hunting - Nadhem AlFardan

eBOOK