|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_ocn896723300 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
141121s2015 caua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d CCO
|d E7B
|d YDXCP
|d COO
|d DEBBG
|d STF
|d B24X7
|d OCLCQ
|d NKT
|d LIV
|d IDEBK
|d OCLCQ
|d OCLCF
|d OCLCO
|d CEF
|d UAB
|d AU@
|d UX1
|d UKAHL
|d OCLCQ
|
019 |
|
|
|a 903921515
|
020 |
|
|
|a 1593275811
|
020 |
|
|
|a 9781593275815
|
020 |
|
|
|a 9781593276416
|q (e-book)
|
020 |
|
|
|a 1593276419
|q (e-book)
|
020 |
|
|
|z 9781593275815
|
029 |
1 |
|
|a DEBBG
|b BV042490256
|
029 |
1 |
|
|a DEBSZ
|b 43483436X
|
029 |
1 |
|
|a GBVCP
|b 815157517
|
035 |
|
|
|a (OCoLC)896723300
|z (OCoLC)903921515
|
037 |
|
|
|a CL0500000504
|b Safari Books Online
|
050 |
|
4 |
|a QA76.774.A53
|b E546 2015
|
082 |
0 |
4 |
|a 004.1675
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Elenkov, Nikolay.
|
245 |
1 |
0 |
|a Android Security Internals :
|b an In-Depth Guide to Android's Security Architecture /
|c Nikolay Elenkov.
|
246 |
3 |
0 |
|a An in-depth guide to Android's security architecture
|
260 |
|
|
|a San Francisco, CA :
|b No Starch Press,
|c Ã2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed November 18, 2014).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a This book describes Android security architecture, including the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. Coverage includes: how Android permissions are declared, used, and enforced; how Android manages application packages and employs code signing to verify their authenticity; how Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks; Android's credential storage system and APIs, which let applications store cryptographic keys securely; the online account management framework and how Google accounts integrate with Android; the implementation of verified boot, disk encryption, lockscreen, and other device security features; and how Android's bootloader and recovery OS are used to perform full system updates, and how to obtain root access. --
|c Edited summary from book.
|
505 |
0 |
0 |
|g 1.
|t Android's Security Model --
|g 2.
|t Permissions --
|g 3.
|t Package Management --
|g 4.
|t User Management --
|g 5.
|t Cryptographic Providers --
|g 6.
|t Network Security and PKI --
|g 7.
|t Credential Storage --
|g 8.
|t Online Account Management --
|g 9.
|t Enterprise Security --
|g 10.
|t Device Security --
|g 11.
|t NFC and Secure Elements --
|g 12.
|t SELinux --
|g 13.
|t System Updates and Root Access.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Android (Electronic resource)
|x Security measures.
|
630 |
0 |
0 |
|a Android (Electronic resource)
|
630 |
0 |
0 |
|a Android (Electronic resource)
|x Programming.
|
630 |
0 |
7 |
|a Android (Electronic resource)
|2 fast
|0 (OCoLC)fst01776064
|
650 |
|
7 |
|a Security systems.
|2 fast
|0 (OCoLC)fst01110883
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781457185496/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33086842
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00075477
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10986549
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis30122686
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12164622
|
994 |
|
|
|a 92
|b IZTAP
|