Android hacker's handbook: [a complete guide to securing the Android operating system]
Saved in:
Format: | Book |
---|---|
Language: | English |
Published: |
Indianapolis, Ind.
Wiley
2014
|
Subjects: | |
Online Access: | Inhaltstext Inhaltsverzeichnis |
Item Description: | Includes bibliographical references and index Contents: Looking at the ecosystem -- Android security design and architecture -- Rooting your device -- Reviewing application security -- Understanding Android's attack surface -- Finding vulnerabilities with fuzz testing -- Debugging and analyzing vulnerabilities -- Exploiting user space software -- Return oriented programming -- Hacking and attacking the kernel -- Attacking the radio interface layer -- Exploit mitigations -- Hardware attacks. |
Physical Description: | XXIX, 545 S. Ill., graph. Darst. 23 cm. |
ISBN: | 111860864X 9781118608647 |
Staff View
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041884066 | ||
003 | DE-604 | ||
005 | 20141210 | ||
007 | t | ||
008 | 140528s2014 ad|| |||| 00||| eng d | ||
010 | |a 2013958298 | ||
016 | 7 | |a 1038865719 |2 DE-101 | |
020 | |a 111860864X |c print |9 1-118-60864-X | ||
020 | |a 9781118608647 |c print |9 978-1-11-860864-7 | ||
035 | |a (OCoLC)881654531 | ||
035 | |a (DE-599)BVBBV041884066 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 |a DE-Aug4 |a DE-29T |a DE-573 |a DE-91G |a DE-860 |a DE-M347 |a DE-861 | ||
050 | 0 | |a QA76.774.A53 D73 2014 | |
082 | 0 | |a 005.8 | |
084 | |a ST 261 |0 (DE-625)143633: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 435f |2 stub | ||
084 | |a DAT 461f |2 stub | ||
245 | 1 | 0 | |a Android hacker's handbook |b [a complete guide to securing the Android operating system] |c Joshua J. Drake ... |
246 | 1 | 0 | |a hackers |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2014 | |
300 | |a XXIX, 545 S. |b Ill., graph. Darst. |c 23 cm. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a Contents: Looking at the ecosystem -- Android security design and architecture -- Rooting your device -- Reviewing application security -- Understanding Android's attack surface -- Finding vulnerabilities with fuzz testing -- Debugging and analyzing vulnerabilities -- Exploiting user space software -- Return oriented programming -- Hacking and attacking the kernel -- Attacking the radio interface layer -- Exploit mitigations -- Hardware attacks. | ||
650 | 4 | |a Android (Electronic resource) | |
650 | 4 | |a Computer security | |
650 | 4 | |a Application software |x Development | |
650 | 4 | |a Mobile computing | |
650 | 4 | |a Hackers | |
650 | 0 | 7 | |a Android |g Systemplattform |0 (DE-588)7635475-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Anwendungssoftware |0 (DE-588)4120906-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hacker |0 (DE-588)4113821-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Anwendungssoftware |0 (DE-588)4120906-0 |D s |
689 | 0 | 1 | |a Android |g Systemplattform |0 (DE-588)7635475-1 |D s |
689 | 0 | 2 | |a Hacker |0 (DE-588)4113821-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Drake, Joshua J. |e Sonstige |0 (DE-588)1050736338 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-60861-6 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-92225-5 |
856 | 4 | 2 | |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4430919&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m HEBIS Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027328129&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027328129 |
Record in the Search Index
_version_ | 1806328054803333120 |
---|---|
adam_text |
Android Hacker's
Handbook
Joshua J Drake
Pau Oliva Fora
Zach Lanier
Collin Mulliner
Stephen A Ridley
Georg Wicherski
WILEY
Contents at a Glance
Introduction XXV
Chapter 1 Looking at the Ecosystem 1
Chapter 2 Android Security Design and Architecture 25
Chapter 3 Rooting Your Device 57
Chapter 4 Reviewing Application Security 83
Chapter 5 Understanding Android's Attack Surface 129
Chapter 6 Finding Vulnerabilities with Fuzz Testing 177
Chapter 7 Debugging and Analyzing Vulnerabilities 205
Chapter 8 Exploiting User Space Software 263
Chapter 9 Return Oriented Programming 291
Chapter 10 Hacking and Attacking the Kernel 309
Chapter 11 Attacking the Radio Interface Layer 367
Chapter 12 Exploit Mitigations 391
Chapter 13 Hardware Attacks 423
Appendix A Tool Catalog 485
Appendix B Open Source Repositories 501
Appendix C References 511
Index 523 |
any_adam_object | 1 |
author_GND | (DE-588)1050736338 |
building | Verbundindex |
bvnumber | BV041884066 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.774.A53 D73 2014 |
callnumber-search | QA76.774.A53 D73 2014 |
callnumber-sort | QA 276.774 A53 D73 42014 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 261 ST 276 ST 277 |
classification_tum | DAT 435f DAT 461f |
ctrlnum | (OCoLC)881654531 (DE-599)BVBBV041884066 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV041884066</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20141210</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">140528s2014 ad|| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2013958298</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1038865719</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111860864X</subfield><subfield code="c">print</subfield><subfield code="9">1-118-60864-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118608647</subfield><subfield code="c">print</subfield><subfield code="9">978-1-11-860864-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881654531</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041884066</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-861</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.774.A53 D73 2014</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 261</subfield><subfield code="0">(DE-625)143633:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 435f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Android hacker's handbook</subfield><subfield code="b">[a complete guide to securing the Android operating system]</subfield><subfield code="c">Joshua J. Drake ...</subfield></datafield><datafield tag="246" ind1="1" ind2="0"><subfield code="a">hackers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIX, 545 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">23 cm.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Contents: Looking at the ecosystem -- Android security design and architecture -- Rooting your device -- Reviewing application security -- Understanding Android's attack surface -- Finding vulnerabilities with fuzz testing -- Debugging and analyzing vulnerabilities -- Exploiting user space software -- Return oriented programming -- Hacking and attacking the kernel -- Attacking the radio interface layer -- Exploit mitigations -- Hardware attacks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Android (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Android</subfield><subfield code="g">Systemplattform</subfield><subfield code="0">(DE-588)7635475-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Anwendungssoftware</subfield><subfield code="0">(DE-588)4120906-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Android</subfield><subfield code="g">Systemplattform</subfield><subfield code="0">(DE-588)7635475-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Hacker</subfield><subfield code="0">(DE-588)4113821-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Drake, Joshua J.</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1050736338</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-60861-6</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-92225-5</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4430919&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HEBIS Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027328129&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027328129</subfield></datafield></record></collection> |
genre | (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV041884066 |
illustrated | Illustrated |
indexdate | 2024-08-03T01:31:12Z |
institution | BVB |
isbn | 111860864X 9781118608647 |
language | English |
lccn | 2013958298 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027328129 |
oclc_num | 881654531 |
open_access_boolean | |
owner | DE-11 DE-Aug4 DE-29T DE-573 DE-91G DE-BY-TUM DE-860 DE-M347 DE-861 |
owner_facet | DE-11 DE-Aug4 DE-29T DE-573 DE-91G DE-BY-TUM DE-860 DE-M347 DE-861 |
physical | XXIX, 545 S. Ill., graph. Darst. 23 cm. |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Wiley |
record_format | marc |
spelling | Android hacker's handbook [a complete guide to securing the Android operating system] Joshua J. Drake ... hackers Indianapolis, Ind. Wiley 2014 XXIX, 545 S. Ill., graph. Darst. 23 cm. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Contents: Looking at the ecosystem -- Android security design and architecture -- Rooting your device -- Reviewing application security -- Understanding Android's attack surface -- Finding vulnerabilities with fuzz testing -- Debugging and analyzing vulnerabilities -- Exploiting user space software -- Return oriented programming -- Hacking and attacking the kernel -- Attacking the radio interface layer -- Exploit mitigations -- Hardware attacks. Android (Electronic resource) Computer security Application software Development Mobile computing Hackers Android Systemplattform (DE-588)7635475-1 gnd rswk-swf Anwendungssoftware (DE-588)4120906-0 gnd rswk-swf Hacker (DE-588)4113821-1 gnd rswk-swf (DE-588)4151278-9 Einführung gnd-content Anwendungssoftware (DE-588)4120906-0 s Android Systemplattform (DE-588)7635475-1 s Hacker (DE-588)4113821-1 s DE-604 Drake, Joshua J. Sonstige (DE-588)1050736338 oth Erscheint auch als Online-Ausgabe 978-1-118-60861-6 Erscheint auch als Online-Ausgabe 978-1-118-92225-5 text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4430919&prov=M&dok_var=1&dok_ext=htm Inhaltstext HEBIS Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027328129&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Android hacker's handbook [a complete guide to securing the Android operating system] Android (Electronic resource) Computer security Application software Development Mobile computing Hackers Android Systemplattform (DE-588)7635475-1 gnd Anwendungssoftware (DE-588)4120906-0 gnd Hacker (DE-588)4113821-1 gnd |
subject_GND | (DE-588)7635475-1 (DE-588)4120906-0 (DE-588)4113821-1 (DE-588)4151278-9 |
title | Android hacker's handbook [a complete guide to securing the Android operating system] |
title_alt | hackers |
title_auth | Android hacker's handbook [a complete guide to securing the Android operating system] |
title_exact_search | Android hacker's handbook [a complete guide to securing the Android operating system] |
title_full | Android hacker's handbook [a complete guide to securing the Android operating system] Joshua J. Drake ... |
title_fullStr | Android hacker's handbook [a complete guide to securing the Android operating system] Joshua J. Drake ... |
title_full_unstemmed | Android hacker's handbook [a complete guide to securing the Android operating system] Joshua J. Drake ... |
title_short | Android hacker's handbook |
title_sort | android hacker s handbook a complete guide to securing the android operating system |
title_sub | [a complete guide to securing the Android operating system] |
topic | Android (Electronic resource) Computer security Application software Development Mobile computing Hackers Android Systemplattform (DE-588)7635475-1 gnd Anwendungssoftware (DE-588)4120906-0 gnd Hacker (DE-588)4113821-1 gnd |
topic_facet | Android (Electronic resource) Computer security Application software Development Mobile computing Hackers Android Systemplattform Anwendungssoftware Hacker Einführung |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4430919&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027328129&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT drakejoshuaj androidhackershandbookacompleteguidetosecuringtheandroidoperatingsystem AT drakejoshuaj hackers |