Android hacker's handbook:
The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security res...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
2014
|
Schlagworte: | |
Online-Zugang: | FHN01 UPA01 |
Zusammenfassung: | The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysisCovers Android application building blocks and security as well as debugging and auditing Android appsPrepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attackAndroid Hacker's Handbookis the first comprehensive resource for IT professionals charged with smartphone security. |
Beschreibung: | Description based upon print version of record |
Beschreibung: | Online Ressource (xxix, 545 Seiten) |
ISBN: | 9781118922255 1118922255 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV043459104 | ||
003 | DE-604 | ||
005 | 20230216 | ||
007 | cr|uuu---uuuuu | ||
008 | 160314s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781118922255 |9 978-1-118-92225-5 | ||
020 | |a 1118922255 |9 1-118-92225-5 | ||
035 | |a (OCoLC)879168013 | ||
035 | |a (DE-599)GBV78246517X | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-739 | ||
082 | 0 | |a 005.276 | |
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Drake, Joshua J. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Android hacker's handbook |
264 | 1 | |a Indianapolis, IN |b Wiley |c 2014 | |
300 | |a Online Ressource (xxix, 545 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record | ||
520 | 1 | |a The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysisCovers Android application building blocks and security as well as debugging and auditing Android appsPrepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attackAndroid Hacker's Handbookis the first comprehensive resource for IT professionals charged with smartphone security. | |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Android |g Systemplattform |0 (DE-588)7635475-1 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 0 | 1 | |a Android |g Systemplattform |0 (DE-588)7635475-1 |D s |
689 | 0 | 2 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Lanier, Zach |e Verfasser |4 aut | |
700 | 1 | |a Mulliner, Collin |e Verfasser |4 aut | |
700 | 1 | |a Oliva, Paulina |e Verfasser |4 aut | |
700 | 1 | |a Ridley, Stephen A. |e Verfasser |4 aut | |
700 | 1 | |a Wicherski, Georg |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-118-60864-7 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-118-60861-6 |
912 | |a ZDB-38-EBR |a ZDB-30-PQE |a ebook | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028876357 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://site.ebrary.com/lib/nuernberg/docDetail.action?docID=11100148 |l FHN01 |p ZDB-38-EBR |q FHN_EBR_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://ebookcentral.proquest.com/lib/uni-passau/detail.action?docID=1662701 |l UPA01 |p ZDB-30-PQE |q UPA_Einzelkauf_Wiley |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176071146340352 |
---|---|
any_adam_object | |
author | Drake, Joshua J. Lanier, Zach Mulliner, Collin Oliva, Paulina Ridley, Stephen A. Wicherski, Georg |
author_facet | Drake, Joshua J. Lanier, Zach Mulliner, Collin Oliva, Paulina Ridley, Stephen A. Wicherski, Georg |
author_role | aut aut aut aut aut aut |
author_sort | Drake, Joshua J. |
author_variant | j j d jj jjd z l zl c m cm p o po s a r sa sar g w gw |
building | Verbundindex |
bvnumber | BV043459104 |
classification_rvk | ST 261 ST 276 ST 277 |
collection | ZDB-38-EBR ZDB-30-PQE ebook |
ctrlnum | (OCoLC)879168013 (DE-599)GBV78246517X |
dewey-full | 005.276 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.276 |
dewey-search | 005.276 |
dewey-sort | 15.276 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03640nmm a2200565 c 4500</leader><controlfield tag="001">BV043459104</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230216 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160314s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118922255</subfield><subfield code="9">978-1-118-92225-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118922255</subfield><subfield code="9">1-118-92225-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)879168013</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV78246517X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.276</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Drake, Joshua J.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Android hacker's handbook</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">Online Ressource (xxix, 545 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysisCovers Android application building blocks and security as well as debugging and auditing Android appsPrepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attackAndroid Hacker's Handbookis the first comprehensive resource for IT professionals charged with smartphone security.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Android</subfield><subfield code="g">Systemplattform</subfield><subfield code="0">(DE-588)7635475-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Android</subfield><subfield code="g">Systemplattform</subfield><subfield code="0">(DE-588)7635475-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lanier, Zach</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mulliner, Collin</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oliva, Paulina</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ridley, Stephen A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Wicherski, Georg</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-118-60864-7</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-118-60861-6</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-EBR</subfield><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ebook</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028876357</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://site.ebrary.com/lib/nuernberg/docDetail.action?docID=11100148</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-38-EBR</subfield><subfield code="q">FHN_EBR_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/uni-passau/detail.action?docID=1662701</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">UPA_Einzelkauf_Wiley</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV043459104 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:26:21Z |
institution | BVB |
isbn | 9781118922255 1118922255 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028876357 |
oclc_num | 879168013 |
open_access_boolean | |
owner | DE-92 DE-739 |
owner_facet | DE-92 DE-739 |
physical | Online Ressource (xxix, 545 Seiten) |
psigel | ZDB-38-EBR ZDB-30-PQE ebook ZDB-38-EBR FHN_EBR_Kauf ZDB-30-PQE UPA_Einzelkauf_Wiley |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Drake, Joshua J. Verfasser aut Android hacker's handbook Indianapolis, IN Wiley 2014 Online Ressource (xxix, 545 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based upon print version of record The first comprehensive guide to discovering and preventing attacks on the Android OSAs the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysisCovers Android application building blocks and security as well as debugging and auditing Android appsPrepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attackAndroid Hacker's Handbookis the first comprehensive resource for IT professionals charged with smartphone security. Hacker (DE-588)4113821-1 gnd rswk-swf Anwendungssoftware (DE-588)4120906-0 gnd rswk-swf Android Systemplattform (DE-588)7635475-1 gnd rswk-swf 1\p (DE-588)4151278-9 Einführung gnd-content Anwendungssoftware (DE-588)4120906-0 s Android Systemplattform (DE-588)7635475-1 s Hacker (DE-588)4113821-1 s DE-604 Lanier, Zach Verfasser aut Mulliner, Collin Verfasser aut Oliva, Paulina Verfasser aut Ridley, Stephen A. Verfasser aut Wicherski, Georg Verfasser aut Erscheint auch als Druck-Ausgabe 978-1-118-60864-7 Erscheint auch als Druck-Ausgabe 978-1-118-60861-6 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Drake, Joshua J. Lanier, Zach Mulliner, Collin Oliva, Paulina Ridley, Stephen A. Wicherski, Georg Android hacker's handbook Hacker (DE-588)4113821-1 gnd Anwendungssoftware (DE-588)4120906-0 gnd Android Systemplattform (DE-588)7635475-1 gnd |
subject_GND | (DE-588)4113821-1 (DE-588)4120906-0 (DE-588)7635475-1 (DE-588)4151278-9 |
title | Android hacker's handbook |
title_auth | Android hacker's handbook |
title_exact_search | Android hacker's handbook |
title_full | Android hacker's handbook |
title_fullStr | Android hacker's handbook |
title_full_unstemmed | Android hacker's handbook |
title_short | Android hacker's handbook |
title_sort | android hacker s handbook |
topic | Hacker (DE-588)4113821-1 gnd Anwendungssoftware (DE-588)4120906-0 gnd Android Systemplattform (DE-588)7635475-1 gnd |
topic_facet | Hacker Anwendungssoftware Android Systemplattform Einführung |
work_keys_str_mv | AT drakejoshuaj androidhackershandbook AT lanierzach androidhackershandbook AT mullinercollin androidhackershandbook AT olivapaulina androidhackershandbook AT ridleystephena androidhackershandbook AT wicherskigeorg androidhackershandbook |