|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
OR_on1192490575 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
200904s2020 xxu ob 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e pn
|c YDX
|d GW5XE
|d EBLCP
|d LQU
|d TEF
|d OCLCF
|d NLW
|d DCT
|d UKAHL
|d UKMGB
|d UMI
|d LIP
|d K6U
|d OCLCQ
|d OCLCO
|d COM
|d OCLCQ
|
015 |
|
|
|a GBC0J0889
|2 bnb
|
016 |
7 |
|
|a 019933709
|2 Uk
|
019 |
|
|
|a 1193128326
|a 1197837750
|a 1203976182
|a 1204240551
|a 1238200415
|a 1249446268
|a 1264824048
|
020 |
|
|
|a 9781484216828
|q (electronic bk.)
|
020 |
|
|
|a 1484216822
|q (electronic bk.)
|
020 |
|
|
|z 1484216814
|
020 |
|
|
|z 9781484216811
|
024 |
7 |
|
|a 10.1007/978-1-4842-1682-8.
|2 doi
|
024 |
8 |
|
|a 10.1007/978-1-4842-1
|
029 |
1 |
|
|a AU@
|b 000067907363
|
029 |
1 |
|
|a AU@
|b 000067958735
|
029 |
1 |
|
|a UKMGB
|b 019933709
|
035 |
|
|
|a (OCoLC)1192490575
|z (OCoLC)1193128326
|z (OCoLC)1197837750
|z (OCoLC)1203976182
|z (OCoLC)1204240551
|z (OCoLC)1238200415
|z (OCoLC)1249446268
|z (OCoLC)1264824048
|
037 |
|
|
|b Springer
|
050 |
|
4 |
|a QA76.76.A65
|
072 |
|
7 |
|a UMS.
|2 bicssc
|
072 |
|
7 |
|a COM051460.
|2 bisacsh
|
072 |
|
7 |
|a UMS.
|2 thema
|
082 |
0 |
4 |
|a 005.1
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gunasekera, Sheran.
|
245 |
1 |
0 |
|a Android apps security :
|b mitigate hacking attacks and security breaches /
|c Sheran Gunasekera.
|
250 |
|
|
|a Second edition.
|
260 |
|
|
|a [United States] :
|b Apress,
|c 2020.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
347 |
|
|
|b PDF
|
490 |
0 |
|
|a ITpro collection
|
505 |
0 |
|
|a Intro -- Table of Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Introduction -- The Startup Landscape -- Between Two Books -- What Is Malware? -- Launching Attacks via Phones -- Hello, I'm Your CTO -- Hello, I'm Your CISO -- Reporting to the CEO -- Reporting to the CFO -- Reporting to the CTO -- Reviewing What Gets Published -- Did I Just Waste My Time Reading All This? -- Chapter 2: Recap of Secure Development Principles -- Privacy -- Swatting -- Data Security -- Data Encryption -- Calling Up Sensitive Information
|
505 |
8 |
|
|a Network Security -- Chapter 3: App Licensing and SafetyNet -- API Key -- Building the Back End -- Pseudocode for the Back End -- Validation -- The Payload -- Can This Be Bypassed? -- So, Why Don't Many People Use SafetyNet? -- Chapter 4: Securing Your Apps at Scale -- Static Source Code Security Analysis -- Third-Party Libraries or Dependencies -- Developer Training -- Obfuscation -- String Encryption -- Class Renaming -- Spaghetti Code/Control Flow Alteration -- NOP and Code Injection -- Which Obfuscator to Use -- Our Base Program -- Summary -- Vulnerability Assessment -- The Red Team
|
505 |
8 |
|
|a The Blue Team -- A Word About Automation -- The Compliance Team -- Visualizing the Team -- Improvements -- Running on the Emulator -- Chapter 5: Hacking Your App -- Feature Examination -- Getting the APK File -- The Android Debug Bridge (adb) -- Developer Mode -- Static Analysis -- APKTool -- JEB -- Chapter 6: The Tool Bag -- The Builder Tools -- Android Studio -- My Android Studio Tweaks -- Creating a Virtual Device -- The Breaker Tools -- Burp Suite -- Web Application Security Test Kit -- My Burp Suite Tweaks -- Frida -- Dynamic Instrumentation Toolkit -- JEB -- Android Decompiler
|
505 |
8 |
|
|a Some Thoughts on Environment Setup -- Chapter 7: Hacking Your App #2 -- Dynamic Analysis -- Disassembling the APK -- Setting the "android:debuggable" Flag -- Reassembling and Signing the APK -- Signing with apksigner -- Signing with jarsigner -- Debugging with JEB -- Debugging for Free -- Frida's Interesting Tricks -- Chapter 8: Rooting Your Android Device -- What Is Root? -- Why Root? -- Rooting Safely -- The Rooting Process -- Getting the Factory Image -- Installing Magisk Manager -- Patching the boot.img File -- Unlock the Device Bootloader -- Flashing the Modified boot.img
|
505 |
8 |
|
|a Completing the Rooting Process -- Looking a Little Bit Deeper -- Other Ways of Rooting -- Testing Frida -- Examining the Filesystem -- Detecting and Hiding Root -- Defeating Root Detection -- Further Tools to Help Debugging -- Summary -- Chapter 9: Bypassing SSL Pinning -- SSL Certificates -- Domain Validation -- Organizational Validation -- Extended Validation -- Self-Signed Certificates -- A Note About Verification -- Getting a DV Certificate -- Certbot -- The Back End -- Back-End Server Specification -- Android Client -- Testing SSL Traffic Interception with Burp Suite -- Adding SSL Pinning
|
520 |
|
|
|a Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. You will: Identify data that should be secured Use the Android APIs to ensure confidentiality and integrity of data Build secure apps for the enterprise Implement Public Key Infrastructure and encryption APIs in apps Master owners, access control lists, and permissions to allow user control over app properties Manage authentication, transport layer encryption, and server-side security.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Android (Electronic resource)
|
630 |
0 |
7 |
|a Android (Electronic resource)
|2 fast
|0 (OCoLC)fst01776064
|
650 |
|
0 |
|a Application software
|x Security measures.
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Mobile apps.
|
650 |
|
6 |
|a Logiciels d'application
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Applications mobiles.
|
650 |
|
7 |
|a Computer programming
|x software development.
|2 bicssc
|
650 |
|
7 |
|a Mobile & handheld device programming
|x Apps programming.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Programming
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Application software
|x Development.
|2 fast
|0 (OCoLC)fst00811707
|
650 |
|
7 |
|a Mobile apps.
|2 fast
|0 (OCoLC)fst01909896
|
776 |
0 |
8 |
|i Print version:
|a Gunasekera, Sheran.
|t Android apps security.
|b Second edition.
|d [United States] : Apress, 2020
|z 1484216814
|z 9781484216811
|w (OCoLC)930996388
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781484216828/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH37890002
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6326365
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16930349
|
994 |
|
|
|a 92
|b IZTAP
|