I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf. There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now.
In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.
You'll learn:
How Android permissions are declared, used, and enforced How Android manages application packages and employs code signing to verify their authenticity How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks About Android's credential storage system and APIs, which let applications store cryptographic keys securely About the online account management framework and how Google accounts integrate with Android About the implementation of verified boot, disk encryption, lockscreen, and other device security features How Android's bootloader and recovery OS are used to perform full system updates, and how to obtain root access With its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.
Разместите ссылку на эту страницу в социальных сетях. Так о ней узнают тысячи человек:
Facebook
Twitter
Мой мир
Вконтакте
Одноклассники
Нашли ошибку? Сообщите администрации сайта: Выберите один из разделов меню и, если необходимо, напишите комментарий
За ложную информацию бан на месяц
Разместите, пожалуйста, ссылку на эту страницу на своём веб-сайте:
Код для вставки на сайт или в блог: Код для вставки в форум (BBCode): Прямая ссылка на эту публикацию:
Understanding Linux Security is essential for administration professionals. Linux Security Fundamentals covers all the IT security basics to help active and aspiring admins respond successfully to the modern threat landscape.
Thanks for your interest in Android app development, the world’s most popular operating system! And, thanks for your interest in the Android Architecture Components, released by Google in 2017 to help address common “big-ticket” problems in Android app development. We start off with a look at Room, an object/relational mapping (ORM) library. This m ...
The march of the Android-based tablets has begun, including Galaxy Samsung Tab, Motorola XOOM, Nook and more. But where do you start? And what can you do with an Android tablet?
The Windows file system is large and complex, featuring not only a huge number of essential files and folders for the Windows OS, your software and hardware, but also several different underlying file systems that manage and maintain file integrity on your disks.
Данный материал НЕ НАРУШАЕТ авторские права никаких физических или юридических лиц. Если это не так - свяжитесь с администрацией сайта. Материал будет немедленно удален. Электронная версия этой публикации предоставляется только в ознакомительных целях. Для дальнейшего её использования Вам необходимо будет приобрести бумажный (электронный, аудио) вариант у правообладателей.