Cargando…

Android apps security : mitigate hacking attacks and security breaches /

Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Gunasekera, Sheran
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [United States] : Apress, 2020.
Edición:Second edition.
Colección:ITpro collection
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_on1192490575
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 200904s2020 xxu ob 001 0 eng d
040 |a YDX  |b eng  |e pn  |c YDX  |d GW5XE  |d EBLCP  |d LQU  |d TEF  |d OCLCF  |d NLW  |d DCT  |d UKAHL  |d UKMGB  |d UMI  |d LIP  |d K6U  |d OCLCQ  |d OCLCO  |d COM  |d OCLCQ 
015 |a GBC0J0889  |2 bnb 
016 7 |a 019933709  |2 Uk 
019 |a 1193128326  |a 1197837750  |a 1203976182  |a 1204240551  |a 1238200415  |a 1249446268  |a 1264824048 
020 |a 9781484216828  |q (electronic bk.) 
020 |a 1484216822  |q (electronic bk.) 
020 |z 1484216814 
020 |z 9781484216811 
024 7 |a 10.1007/978-1-4842-1682-8.  |2 doi 
024 8 |a 10.1007/978-1-4842-1 
029 1 |a AU@  |b 000067907363 
029 1 |a AU@  |b 000067958735 
029 1 |a UKMGB  |b 019933709 
035 |a (OCoLC)1192490575  |z (OCoLC)1193128326  |z (OCoLC)1197837750  |z (OCoLC)1203976182  |z (OCoLC)1204240551  |z (OCoLC)1238200415  |z (OCoLC)1249446268  |z (OCoLC)1264824048 
037 |b Springer 
050 4 |a QA76.76.A65 
072 7 |a UMS.  |2 bicssc 
072 7 |a COM051460.  |2 bisacsh 
072 7 |a UMS.  |2 thema 
082 0 4 |a 005.1  |2 23 
049 |a UAMI 
100 1 |a Gunasekera, Sheran. 
245 1 0 |a Android apps security :  |b mitigate hacking attacks and security breaches /  |c Sheran Gunasekera. 
250 |a Second edition. 
260 |a [United States] :  |b Apress,  |c 2020. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
490 0 |a ITpro collection 
505 0 |a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Introduction -- The Startup Landscape -- Between Two Books -- What Is Malware? -- Launching Attacks via Phones -- Hello, I'm Your CTO -- Hello, I'm Your CISO -- Reporting to the CEO -- Reporting to the CFO -- Reporting to the CTO -- Reviewing What Gets Published -- Did I Just Waste My Time Reading All This? -- Chapter 2: Recap of Secure Development Principles -- Privacy -- Swatting -- Data Security -- Data Encryption -- Calling Up Sensitive Information 
505 8 |a Network Security -- Chapter 3: App Licensing and SafetyNet -- API Key -- Building the Back End -- Pseudocode for the Back End -- Validation -- The Payload -- Can This Be Bypassed? -- So, Why Don't Many People Use SafetyNet? -- Chapter 4: Securing Your Apps at Scale -- Static Source Code Security Analysis -- Third-Party Libraries or Dependencies -- Developer Training -- Obfuscation -- String Encryption -- Class Renaming -- Spaghetti Code/Control Flow Alteration -- NOP and Code Injection -- Which Obfuscator to Use -- Our Base Program -- Summary -- Vulnerability Assessment -- The Red Team 
505 8 |a The Blue Team -- A Word About Automation -- The Compliance Team -- Visualizing the Team -- Improvements -- Running on the Emulator -- Chapter 5: Hacking Your App -- Feature Examination -- Getting the APK File -- The Android Debug Bridge (adb) -- Developer Mode -- Static Analysis -- APKTool -- JEB -- Chapter 6: The Tool Bag -- The Builder Tools -- Android Studio -- My Android Studio Tweaks -- Creating a Virtual Device -- The Breaker Tools -- Burp Suite -- Web Application Security Test Kit -- My Burp Suite Tweaks -- Frida -- Dynamic Instrumentation Toolkit -- JEB -- Android Decompiler 
505 8 |a Some Thoughts on Environment Setup -- Chapter 7: Hacking Your App #2 -- Dynamic Analysis -- Disassembling the APK -- Setting the "android:debuggable" Flag -- Reassembling and Signing the APK -- Signing with apksigner -- Signing with jarsigner -- Debugging with JEB -- Debugging for Free -- Frida's Interesting Tricks -- Chapter 8: Rooting Your Android Device -- What Is Root? -- Why Root? -- Rooting Safely -- The Rooting Process -- Getting the Factory Image -- Installing Magisk Manager -- Patching the boot.img File -- Unlock the Device Bootloader -- Flashing the Modified boot.img 
505 8 |a Completing the Rooting Process -- Looking a Little Bit Deeper -- Other Ways of Rooting -- Testing Frida -- Examining the Filesystem -- Detecting and Hiding Root -- Defeating Root Detection -- Further Tools to Help Debugging -- Summary -- Chapter 9: Bypassing SSL Pinning -- SSL Certificates -- Domain Validation -- Organizational Validation -- Extended Validation -- Self-Signed Certificates -- A Note About Verification -- Getting a DV Certificate -- Certbot -- The Back End -- Back-End Server Specification -- Android Client -- Testing SSL Traffic Interception with Burp Suite -- Adding SSL Pinning 
520 |a Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. You will: Identify data that should be secured Use the Android APIs to ensure confidentiality and integrity of data Build secure apps for the enterprise Implement Public Key Infrastructure and encryption APIs in apps Master owners, access control lists, and permissions to allow user control over app properties Manage authentication, transport layer encryption, and server-side security. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Android (Electronic resource) 
630 0 7 |a Android (Electronic resource)  |2 fast  |0 (OCoLC)fst01776064 
650 0 |a Application software  |x Security measures. 
650 0 |a Application software  |x Development. 
650 0 |a Mobile apps. 
650 6 |a Logiciels d'application  |x Sécurité  |x Mesures. 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Applications mobiles. 
650 7 |a Computer programming  |x software development.  |2 bicssc 
650 7 |a Mobile & handheld device programming  |x Apps programming.  |2 bicssc 
650 7 |a Computers  |x Programming  |x General.  |2 bisacsh 
650 7 |a Application software  |x Development.  |2 fast  |0 (OCoLC)fst00811707 
650 7 |a Mobile apps.  |2 fast  |0 (OCoLC)fst01909896 
776 0 8 |i Print version:  |a Gunasekera, Sheran.  |t Android apps security.  |b Second edition.  |d [United States] : Apress, 2020  |z 1484216814  |z 9781484216811  |w (OCoLC)930996388 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484216828/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37890002 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6326365 
938 |a YBP Library Services  |b YANK  |n 16930349 
994 |a 92  |b IZTAP