|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn895913691 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141118s2013 flua ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d DEBBG
|d E7B
|d TXI
|d DEBSZ
|d OCLCQ
|d YDXCP
|d OCLCQ
|d LIV
|d OCLCF
|d CEF
|d COO
|d G3B
|d UAB
|d AU@
|d RDF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 903956040
|
020 |
|
|
|a 9781482209860
|
020 |
|
|
|a 1482209861
|
020 |
|
|
|a 9781482209853
|
020 |
|
|
|a 1482209853
|
020 |
|
|
|a 9781439896471
|
020 |
|
|
|a 143989647X
|
020 |
|
|
|a 1439896461
|
020 |
|
|
|a 9781439896464
|
020 |
|
|
|z 9781439896464
|
029 |
1 |
|
|a DEBBG
|b BV042490170
|
029 |
1 |
|
|a DEBSZ
|b 434833517
|
029 |
1 |
|
|a GBVCP
|b 882842498
|
035 |
|
|
|a (OCoLC)895913691
|z (OCoLC)903956040
|
037 |
|
|
|a CL0500000501
|b Safari Books Online
|
050 |
|
4 |
|a QA76.76.O63
|b M57 2013
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Dubey, Abhishek
|c (Information security)
|
245 |
1 |
0 |
|a Android security :
|b attacks and defenses /
|c Abhishek Dubey, Anmol Misra.
|
260 |
|
|
|a Boca Raton, FL :
|b CRC Press,
|c ©2013.
|
300 |
|
|
|a 1 online resource (xx, 249 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Introduction -- Android architecture -- Android application architecture -- Android (in)security -- Pen testing Android -- Reverse engineering Android applications -- Modifying the behavior of Android applications without source code -- Hacking Android -- Securing Android for the enterprise environment -- Browser security and future threat landscape.
|
504 |
|
|
|a Includes bibliographical references at the end of each chapters.
|
520 |
|
|
|a Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Android (Electronic resource)
|
630 |
0 |
7 |
|a Android (Electronic resource)
|2 fast
|
650 |
|
0 |
|a Operating systems (Computers)
|x Security measures.
|
650 |
|
0 |
|a Smartphones
|x Security measures.
|
650 |
|
0 |
|a Mobile computing
|x Security measures.
|
650 |
|
6 |
|a Systèmes d'exploitation (Ordinateurs)
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Téléphones intelligents
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Informatique mobile
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Operating systems (Computers)
|x Security measures
|2 fast
|
700 |
1 |
|
|a Misra, Anmol.
|
776 |
0 |
8 |
|i Print version :
|a Misra, Anmol.
|t Android security.
|d Boca Raton : Taylor & Francis, 2013
|z 9781439896464
|w (DLC) 2013008016
|w (OCoLC)744303810
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439896464/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr11002690
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12583674
|
994 |
|
|
|a 92
|b IZTAP
|