Android security: attacks and defenses
"Preface - Audience: Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and mea...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
[2013]
|
Schriftenreihe: | An Auerbach book
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "Preface - Audience: Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. - Structure: Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of Android permissions and the JEB Decompiler, respectively." |
Beschreibung: | xx, 255 Seiten Illustrationen, Diagramme |
ISBN: | 9781439896464 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040660041 | ||
003 | DE-604 | ||
005 | 20160518 | ||
007 | t | ||
008 | 130109s2013 a||| |||| 00||| eng d | ||
020 | |a 9781439896464 |c Hardback |9 978-1-4398-9646-4 | ||
035 | |a (OCoLC)854683005 | ||
035 | |a (DE-599)BVBBV040660041 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-91G |a DE-11 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 435f |2 stub | ||
084 | |a DAT 055f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
084 | |a DAT 050f |2 stub | ||
100 | 1 | |a Dubey, Abhishek |e Verfasser |0 (DE-588)1100546537 |4 aut | |
245 | 1 | 0 | |a Android security |b attacks and defenses |c Abhishek Dudey, Anmol Misra |
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c [2013] | |
264 | 4 | |c © 2013 | |
300 | |a xx, 255 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a An Auerbach book | |
520 | |a "Preface - Audience: Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. - Structure: Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of Android permissions and the JEB Decompiler, respectively." | ||
630 | 0 | 4 | |a Android (Electronic resource) |
650 | 7 | |a COMPUTERS / Networking / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Software Development & Engineering / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Operating systems (Computers) |x Security measures | |
650 | 4 | |a Smartphones |x Security measures | |
650 | 4 | |a Mobile computing |x Security measures | |
650 | 4 | |a COMPUTERS / Networking / General | |
650 | 4 | |a COMPUTERS / Software Development & Engineering / General | |
650 | 4 | |a COMPUTERS / Security / General | |
650 | 0 | 7 | |a Android |g Systemplattform |0 (DE-588)7635475-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Android |g Systemplattform |0 (DE-588)7635475-1 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Misra, Anmol |e Verfasser |0 (DE-588)1100547312 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-4398-9647-1 |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025486814&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025486814 |
Datensatz im Suchindex
_version_ | 1804149782812295168 |
---|---|
adam_text | Contents
Dedication
v
Foreword
xiii
Preface
xv
About the Authors
xvii
Acknowledgments
xix
Chapter
1
Introduction
1
1.1
Why Android
1
1.2
Evolution of Mobile Threats
5
1.3
Android Overview
11
1.4
Android Marketplaces
13
1.5
Summary
15
Chapter
2
Android Architecture
17
2.1
Android Architecture Overview
17
2.1.1
Linux Kernel
18
2.1.2
Libraries
25
2.1.3
Android Runtime
26
2.1.4
Application Framework
26
2.1.5
Applications
27
VII
viii Android
Security: Attacks and Defenses
2.2
Android Start Up and
Zygote
28
2.3
Android SDK and Tools
28
2.3.1
Downloading and Installing the Android SDK
29
2.3.2
Developing with Eclipse and ADT
31
2.3.3
Android Tools
31
2.3.4
DDMS
34
2.3.5
ADB
35
2.3.6
ProGuard
35
2.4
Anatomy of the Hello World Application
39
2.4.1
Understanding Hello World
39
2.5
Summary
43
Chapter
3
Android Application Architecture
47
3.1
Application Components
47
3.1.1
Activities
48
3.1.2
Intents
51
3.1.3
Broadcast Receivers
57
3.1.4
Services
58
3.1.5
Content Providers
60
3.2
Activity Ufecycles
61
3.3
Summary
70
Chapter
4
Android (in)Security
71
4.1
Android Security Model
71
4.2
Permission Enforcement
—
Linux
72
4.3
Android s Manifest Permissions
75
4.3.1
Requesting Permissions
76
4.3.2
Putting It All Together
79
4.4
Mobile Security Issues
86
4.4.1
Device
86
4.4.2
Patching
86
4.4.3
External Storage
87
4.4.4
Keyboards
87
4.4.5
Data Privacy
87
4.4.6
Application Security
87
4.4.7
Legacy Code
88
Contents
ix
4.5
Recent Android Attacks
—
A Walkthrough
88
4.5.1
Analysis of DroidDream Variant
88
4.5.2
Analysis of Zsone
90
4.5.3
Analysis of Zitmo Trojan
91
4.6
Summary
93
Chapter
5
Pen Testing Android
97
5.1
Penetration Testing Methodology
97
5.1.1
External Penetration Test
98
5.1.2
Internal Penetration Test
98
5.1.3
Penetration Test Methodologies
99
5.1.4
Static Analysis
99
5.1.5
Steps to Pen Test Android OS and Devices
100
5.2
Tools for Penetration Testing Android
100
5.2.1
Nmap
100
5.2.2
BusyBox
101
5.2.3
Wireshark
103
5.2.4
Vulnerabilities in the Android OS
103
5.3
Penetration Testing
—
Android Applications
106
5.3.1
Android Applications
106
5.3.2
Application Security
113
5.4
Miscellaneous Issues
117
5.5
Summary
118
Chapter
6
Reverse Engineering Android Applications
119
6.1
Introduction
119
6.2
What is
Malware?
121
6.3
Identifying Android
Malware
122
6.4
Reverse Engineering Methodology for Android
Applications
123
6.5
Summary
144
Chapter
7
Modifying the Behavior of Android Applications
without Source Code
147
7.1
Introduction
147
7.1.1
To Add Malicious Behavior
148
χ
Android
Security: Attacks and Defenses
7.1.2
To Eliminate Malicious Behavior
148
7.1.3
To Bypass Intended Functionality
148
7.2
DEX File Format
148
7.3
Case Study: Modifying the Behavior of an
Application
150
7.4
Real World Example
1—
Google Wallet Vulnerability
161
7.5
Real World Example
2—
Skype Vulnerability
(CVE-2011-1717)
162
7.6
Defensive Strategies
163
7.6.1
Perform Code Obfuscation
163
7.6.2
Perform Server Side Processing
167
7.6.3
Perform Iterative Hashing and Use Salt
167
7.6.4
Choose the Right Location for Sensitive
Information
167
7.6.5
Cryptography
168
7.6.6
Conclusion
168
7.7
Summary
168
Chapter
8
Hacking Android
169
8.1
Introduction
169
8.2
Android File System
170
8.2.1
Mount Points
170
8.2.2
File Systems
170
8.2.3
Directory Structure
170
8.3
Android Application Data
173
8.3.1
Storage Options
173
8.3.2
/data/data
176
8.4
Rooting Android Devices
178
8.5
Imaging Android
181
8.6
Accessing Application Databases
183
8.7
Extracting Data from Android Devices
187
8.8
Summary
187
Chapter
9
Securing Android for the Enterprise
Environment
193
9.1
Android in Enterprise
193
9.1.1
Securitv Concerns for Android in Enterprise
193
Contents xi
9.1.2
End-User Awareness
197
9.1.3
Compliance/Audit Considerations
197
9.1.4
Recommended Security Practices for Mobile
Devices
198
9.2
Hardening Android
199
9.2.1
Deploying Android Securely
199
9.2.2
Device Administration
208
9.3
Summary
211
Chapter
10
Browser Security and Future Threat Landscape
213
10.1
Mobile HTML Security
213
10.1.1
Cross-Site Scripting
216
10.1.2
SQL Injection
217
10.1.3
Cross-Site Request Forgery
217
10.1.4
Phishing
217
10.2
Mobile Browser Security
218
10.2.1
Browser Vulnerabilities
218
10.3
The Future Landscape
220
10.3.1
The Phone as a Spying/Tracking Device
220
10.3.2
Controlling Corporate Networks and
Other Devices through Mobile Devices
221
10.3.3
Mobile Wallets and NFC
221
10.4
Summary
222
Appendix A
223
Appendix
В
233
B.1 Views
233
B.2 Code Views
235
B.3 Keyboard Shortcuts
236
B.4 Options
236
Appendix
С
239
Glossary
241
Index
251
|
any_adam_object | 1 |
author | Dubey, Abhishek Misra, Anmol |
author_GND | (DE-588)1100546537 (DE-588)1100547312 |
author_facet | Dubey, Abhishek Misra, Anmol |
author_role | aut aut |
author_sort | Dubey, Abhishek |
author_variant | a d ad a m am |
building | Verbundindex |
bvnumber | BV040660041 |
classification_rvk | ST 261 ST 276 |
classification_tum | DAT 435f DAT 055f DAT 461f DAT 050f |
ctrlnum | (OCoLC)854683005 (DE-599)BVBBV040660041 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03646nam a2200589 c 4500</leader><controlfield tag="001">BV040660041</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20160518 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130109s2013 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439896464</subfield><subfield code="c">Hardback</subfield><subfield code="9">978-1-4398-9646-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)854683005</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040660041</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 435f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 050f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dubey, Abhishek</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1100546537</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Android security</subfield><subfield code="b">attacks and defenses</subfield><subfield code="c">Abhishek Dudey, Anmol Misra</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">[2013]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 255 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">An Auerbach book</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Preface - Audience: Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. - Structure: Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of Android permissions and the JEB Decompiler, respectively."</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Android (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Software Development & Engineering / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Smartphones</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Networking / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Software Development & Engineering / General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Android</subfield><subfield code="g">Systemplattform</subfield><subfield code="0">(DE-588)7635475-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Android</subfield><subfield code="g">Systemplattform</subfield><subfield code="0">(DE-588)7635475-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Misra, Anmol</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1100547312</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4398-9647-1</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025486814&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025486814</subfield></datafield></record></collection> |
id | DE-604.BV040660041 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:28:30Z |
institution | BVB |
isbn | 9781439896464 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025486814 |
oclc_num | 854683005 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-91G DE-BY-TUM DE-11 |
owner_facet | DE-473 DE-BY-UBG DE-91G DE-BY-TUM DE-11 |
physical | xx, 255 Seiten Illustrationen, Diagramme |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | CRC Press |
record_format | marc |
series2 | An Auerbach book |
spelling | Dubey, Abhishek Verfasser (DE-588)1100546537 aut Android security attacks and defenses Abhishek Dudey, Anmol Misra Boca Raton ; London ; New York CRC Press [2013] © 2013 xx, 255 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier An Auerbach book "Preface - Audience: Our book is targeted at security architects, system administrators, enterprise SDLC managers, developers, white-hat hackers, penetration testers, IT architects, CIOs, students, and regular users. If you want to learn about Android security features, possible attacks and means to prevent them, you will find various chapters in this book as a useful starting point. Our goal is to provide readers with enough information so that they can quickly get up and running on Android, with all of the basics of the Android platform and related security issues under their belts. If you are an Android hacker, or if you are very well versed in security concerns of the platform, this book is not for you. - Structure: Our book is divided into 10 chapters. Chapter 1 provides an introduction to the mobile landscape. Chapters 2 and 3 introduce the reader to the Android OS and application architecture, respectively. Chapter 4 delves into Android security features. Chapters 5 through 9 cover various aspects of security for the Android platform and applications. The last chapter looks at the future landscape of threats. Appendixes A and B (found towards the end of the book) talk about the severity ratings of Android permissions and the JEB Decompiler, respectively." Android (Electronic resource) COMPUTERS / Networking / General bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Security / General bisacsh Operating systems (Computers) Security measures Smartphones Security measures Mobile computing Security measures COMPUTERS / Networking / General COMPUTERS / Software Development & Engineering / General COMPUTERS / Security / General Android Systemplattform (DE-588)7635475-1 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Android Systemplattform (DE-588)7635475-1 s Datensicherung (DE-588)4011144-1 s DE-604 Misra, Anmol Verfasser (DE-588)1100547312 aut Erscheint auch als Online-Ausgabe 978-1-4398-9647-1 Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025486814&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Dubey, Abhishek Misra, Anmol Android security attacks and defenses Android (Electronic resource) COMPUTERS / Networking / General bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Security / General bisacsh Operating systems (Computers) Security measures Smartphones Security measures Mobile computing Security measures COMPUTERS / Networking / General COMPUTERS / Software Development & Engineering / General COMPUTERS / Security / General Android Systemplattform (DE-588)7635475-1 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)7635475-1 (DE-588)4011144-1 |
title | Android security attacks and defenses |
title_auth | Android security attacks and defenses |
title_exact_search | Android security attacks and defenses |
title_full | Android security attacks and defenses Abhishek Dudey, Anmol Misra |
title_fullStr | Android security attacks and defenses Abhishek Dudey, Anmol Misra |
title_full_unstemmed | Android security attacks and defenses Abhishek Dudey, Anmol Misra |
title_short | Android security |
title_sort | android security attacks and defenses |
title_sub | attacks and defenses |
topic | Android (Electronic resource) COMPUTERS / Networking / General bisacsh COMPUTERS / Software Development & Engineering / General bisacsh COMPUTERS / Security / General bisacsh Operating systems (Computers) Security measures Smartphones Security measures Mobile computing Security measures COMPUTERS / Networking / General COMPUTERS / Software Development & Engineering / General COMPUTERS / Security / General Android Systemplattform (DE-588)7635475-1 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Android (Electronic resource) COMPUTERS / Networking / General COMPUTERS / Software Development & Engineering / General COMPUTERS / Security / General Operating systems (Computers) Security measures Smartphones Security measures Mobile computing Security measures Android Systemplattform Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025486814&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT dubeyabhishek androidsecurityattacksanddefenses AT misraanmol androidsecurityattacksanddefenses |