Cargando…

Android hacker's handbook /

The first comprehensive guide to discovering and preventing attacks on the Android OS. As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security r...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Drake, Joshua J.
Otros Autores: Lanier, Zach, Mulliner, Collin, Oliva, Pau, Ridley, Stephen A., Wicherski, Georg
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, IN : Wiley, ©2014.
©2014
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn875820167
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 140405s2014 inu ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d N$T  |d IDEBK  |d TEFOD  |d E7B  |d YDXCP  |d DOS  |d RECBK  |d OCLCA  |d COO  |d OCLCQ  |d DEBSZ  |d TEFOD  |d OCLCQ  |d UMI  |d CNNOR  |d S4S  |d MOR  |d Z5A  |d CCO  |d PIFAG  |d ZCU  |d MERUC  |d OCLCQ  |d U3W  |d OCLCA  |d STF  |d OCLCF  |d CEF  |d NRAMU  |d CRU  |d ICG  |d VTS  |d OCLCQ  |d OCLCO  |d INT  |d VT2  |d CDX  |d OCLCQ  |d OCLCO  |d WYU  |d G3B  |d TKN  |d OCLCQ  |d OCLCO  |d DKC  |d OCLCQ  |d DCT  |d OCLCQ  |d OCLCO  |d UHL  |d OCLCQ  |d OTZ  |d UKAHL  |d OCLCQ  |d VLY  |d TUHNV  |d B3G  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
015 |a GBB3B0158  |2 bnb 
016 7 |a 016558562  |2 Uk 
019 |a 880132074  |a 887945433  |a 957979789  |a 961650945  |a 962632782  |a 1110790206  |a 1112992229  |a 1121216024  |a 1126153190  |a 1162267823  |a 1282076138 
020 |a 9781118608616  |q (electronic bk.) 
020 |a 1118608615  |q (electronic bk.) 
020 |a 9781118922255  |q (electronic bk.) 
020 |a 1118922255  |q (electronic bk.) 
020 |a 1306638100 
020 |a 9781306638104 
020 |z 9781118608647 
020 |z 111860864X 
024 8 |a 9781118608647 
029 1 |a AU@  |b 000055967099 
029 1 |a CHNEW  |b 000666143 
029 1 |a CHNEW  |b 000686623 
029 1 |a CHNEW  |b 000887290 
029 1 |a DEBBG  |b BV043608593 
029 1 |a DEBSZ  |b 443428689 
029 1 |a NZ1  |b 15557336 
035 |a (OCoLC)875820167  |z (OCoLC)880132074  |z (OCoLC)887945433  |z (OCoLC)957979789  |z (OCoLC)961650945  |z (OCoLC)962632782  |z (OCoLC)1110790206  |z (OCoLC)1112992229  |z (OCoLC)1121216024  |z (OCoLC)1126153190  |z (OCoLC)1162267823  |z (OCoLC)1282076138 
037 |a FF00C74B-FA4B-4D1F-BE11-D14179C99657  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.76.A65 
072 7 |a COM  |x 051390  |2 bisacsh 
072 7 |a COM  |x 051440  |2 bisacsh 
072 7 |a COM  |x 051230  |2 bisacsh 
082 0 4 |a 005.276  |2 22 
049 |a UAMI 
100 1 |a Drake, Joshua J. 
245 1 0 |a Android hacker's handbook /  |c Joshua J. Drake, Pau Oliva Fora, Zach Lanier, Collin Mulliner, Stephen A. Ridley, Georg Wicherski. 
260 |a Indianapolis, IN :  |b Wiley,  |c ©2014. 
264 4 |c ©2014 
300 |a 1 online resource (577 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
505 0 |a Cover; Title Page; Copyright; Contents; Chapter 1 Looking at the Ecosystem; Understanding Android's Roots; Company History; Version History; Examining the Device Pool; Open Source, Mostly; Understanding Android Stakeholders; Google; Hardware Vendors; Carriers; Developers; Users; Grasping Ecosystem Complexities; Fragmentation; Compatibility; Update Issues; Security versus Openness; Public Disclosures; Summary; Chapter 2 Android Security Design and Architecture; Understanding Android System Architecture; Understanding Security Boundaries and Enforcement; Android's Sandbox; Android Permissions. 
505 8 |a Looking Closer at the Layers Android Applications; The Android Framework; The Dalvik Virtual Machine; User-Space Native Code; The Kernel; Complex Security, Complex Exploits; Summary; Chapter 3 Rooting Your Device; Understanding the Partition Layout; Determining the Partition Layout; Understanding the Boot Process; Accessing Download Mode; Locked and Unlocked Boot Loaders; Stock and Custom Recovery Images; Rooting with an Unlocked Boot Loader; Rooting with a Locked Boot Loader; Gaining Root on a Booted System; NAND Locks, Temporary Root, and Permanent Root; Persisting a Soft Root. 
505 8 |a History of Known Attacks Kernel: Wunderbar/asroot; Recovery: Volez; Udev: Exploid; Adbd: RageAgainstTheCage; Zygote: Zimperlich and Zysploit; Ashmem: KillingInTheNameOf and psneuter; Vold: GingerBreak; PowerVR: levitator; Libsysutils: zergRush; Kernel: mempodroid; File Permission and Symbolic Link-Related Attacks; Adb Restore Race Condition; Exynos4: exynos-abuse; Diag: lit / diaggetroot; Summary; Chapter 4 Reviewing Application Security; Common Issues; App Permission Issues; Insecure Transmission of Sensitive Data; Insecure Data Storage; Information Leakage Through Logs. 
505 8 |a Unsecured IPC Endpoints Case Study: Mobile Security App; Profiling; Static Analysis; Dynamic Analysis; Attack; Case Study: SIP Client; Enter Drozer; Discovery; Snarfing; Injection; Summary; Chapter 5 Understanding Android's Attack Surface; An Attack Terminology Primer; Attack Vectors; Attack Surfaces; Classifying Attack Surfaces; Surface Properties; Classification Decisions; Remote Attack Surfaces; Networking Concepts; Networking Stacks; Exposed Network Services; Mobile Technologies; Client-side Attack Surface; Google Infrastructure; Physical Adjacency; Wireless Communications. 
505 8 |a Other Technologies Local Attack Surfaces; Exploring the File System; Finding Other Local Attack Surfaces; Physical Attack Surfaces; Dismantling Devices; USB; Other Physical Attack Surfaces; Third-Party Modifications; Summary; Chapter 6 Finding Vulnerabilities with Fuzz Testing; Fuzzing Background; Identifying a Target; Crafting Malformed Inputs; Processing Inputs; Monitoring Results; Fuzzing on Android; Fuzzing Broadcast Receivers; Identifying a Target; Generating Inputs; Delivering Inputs; Monitoring Testing; Fuzzing Chrome for Android; Selecting a Technology to Target; Generating Inputs. 
505 8 |a Processing Inputs. 
520 |a The first comprehensive guide to discovering and preventing attacks on the Android OS. As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis; Covers Android application building blocks and security as well as debugging and auditing Android apps; Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack. Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.--  |c Publisher description. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
542 |f Copyright © Wiley  |g 2013 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Android (Electronic resource) 
630 0 7 |a Android (Electronic resource)  |2 fast 
630 0 7 |a Android (Electronic resource)  |2 nli 
650 0 |a Computer security. 
650 0 |a Application software  |x Development. 
650 0 |a Mobile computing. 
650 0 |a Hackers. 
650 0 |a Smartphones  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Informatique mobile. 
650 6 |a Pirates informatiques. 
650 6 |a Téléphones intelligents  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Programming  |x Open Source.  |2 bisacsh 
650 7 |a COMPUTERS  |x Software Development & Engineering  |x Tools.  |2 bisacsh 
650 7 |a COMPUTERS  |x Software Development & Engineering  |x General.  |2 bisacsh 
650 7 |a Application software  |x Development  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Hackers  |2 fast 
650 7 |a Mobile computing  |2 fast 
650 7 |a Computer security.  |2 nli 
650 7 |a Application software  |x Development.  |2 nli 
650 7 |a Mobile computing.  |2 nli 
650 7 |a Hackers.  |2 nli 
700 1 |a Lanier, Zach. 
700 1 |a Mulliner, Collin. 
700 1 |a Oliva, Pau. 
700 1 |a Ridley, Stephen A. 
700 1 |a Wicherski, Georg. 
758 |i has work:  |a Android hacker's handbook (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGqGVcXtT9WtM8jP4bpPry  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Drake, Joshua J.  |t Android Hacker's Handbook.  |d Hoboken : Wiley, 2014  |z 9781118608647 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1662701  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26312480 
938 |a Coutts Information Services  |b COUT  |n 28112303 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1662701 
938 |a ebrary  |b EBRY  |n ebr10856850 
938 |a EBSCOhost  |b EBSC  |n 752686 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis28112303 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00311989 
938 |a YBP Library Services  |b YANK  |n 11744627 
938 |a YBP Library Services  |b YANK  |n 11750991 
994 |a 92  |b IZTAP