Android security: attacks and defenses
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton, FL
CRC Press
2013
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781439896464/?ar |
Zusammenfassung: | Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on. |
Beschreibung: | Includes bibliographical references at the end of each chapters. - Print version record |
Umfang: | 1 Online-Ressource (xx, 249 Seiten) illustrations |
ISBN: | 9781482209860 1482209861 9781482209853 1482209853 9781439896471 143989647X 1439896461 9781439896464 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047579455 | ||
003 | DE-627-1 | ||
005 | 20240228115709.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2013 xx |||||o 00| ||eng c | ||
020 | |a 9781482209860 |9 978-1-4822-0986-0 | ||
020 | |a 1482209861 |9 1-4822-0986-1 | ||
020 | |a 9781482209853 |9 978-1-4822-0985-3 | ||
020 | |a 1482209853 |9 1-4822-0985-3 | ||
020 | |a 9781439896471 |9 978-1-4398-9647-1 | ||
020 | |a 143989647X |9 1-4398-9647-X | ||
020 | |a 1439896461 |9 1-4398-9646-1 | ||
020 | |a 9781439896464 |9 978-1-4398-9646-4 | ||
020 | |a 9781439896464 |9 978-1-4398-9646-4 | ||
035 | |a (DE-627-1)047579455 | ||
035 | |a (DE-599)KEP047579455 | ||
035 | |a (ORHE)9781439896464 | ||
035 | |a (DE-627-1)047579455 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Dubey, Abhishek |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Android security |b attacks and defenses |c Abhishek Dubey, Anmol Misra |
264 | 1 | |a Boca Raton, FL |b CRC Press |c 2013 | |
300 | |a 1 Online-Ressource (xx, 249 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references at the end of each chapters. - Print version record | ||
520 | |a Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on. | ||
630 | 2 | 0 | |a Android (Electronic resource) |
650 | 0 | |a Operating systems (Computers) |x Security measures | |
650 | 0 | |a Smartphones |x Security measures | |
650 | 0 | |a Mobile computing |x Security measures | |
650 | 4 | |a Android (Electronic resource) | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures | |
650 | 4 | |a Téléphones intelligents ; Sécurité ; Mesures | |
650 | 4 | |a Informatique mobile ; Sécurité ; Mesures | |
650 | 4 | |a Operating systems (Computers) ; Security measures | |
700 | 1 | |a Misra, Anmol |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781439896464 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781439896464 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781439896464/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047579455 |
---|---|
_version_ | 1821494878340644864 |
adam_text | |
any_adam_object | |
author | Dubey, Abhishek |
author2 | Misra, Anmol |
author2_role | ctb |
author2_variant | a m am |
author_facet | Dubey, Abhishek Misra, Anmol |
author_role | aut |
author_sort | Dubey, Abhishek |
author_variant | a d ad |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047579455 (DE-599)KEP047579455 (ORHE)9781439896464 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02790cam a22005772 4500</leader><controlfield tag="001">ZDB-30-ORH-047579455</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115709.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781482209860</subfield><subfield code="9">978-1-4822-0986-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1482209861</subfield><subfield code="9">1-4822-0986-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781482209853</subfield><subfield code="9">978-1-4822-0985-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1482209853</subfield><subfield code="9">1-4822-0985-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439896471</subfield><subfield code="9">978-1-4398-9647-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">143989647X</subfield><subfield code="9">1-4398-9647-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1439896461</subfield><subfield code="9">1-4398-9646-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439896464</subfield><subfield code="9">978-1-4398-9646-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781439896464</subfield><subfield code="9">978-1-4398-9646-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047579455</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047579455</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781439896464</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047579455</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dubey, Abhishek</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Android security</subfield><subfield code="b">attacks and defenses</subfield><subfield code="c">Abhishek Dubey, Anmol Misra</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 249 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references at the end of each chapters. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Android (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Smartphones</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Mobile computing</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Android (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Téléphones intelligents ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatique mobile ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers) ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Misra, Anmol</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781439896464</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781439896464</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781439896464/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047579455 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:22Z |
institution | BVB |
isbn | 9781482209860 1482209861 9781482209853 1482209853 9781439896471 143989647X 1439896461 9781439896464 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xx, 249 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | CRC Press |
record_format | marc |
spelling | Dubey, Abhishek VerfasserIn aut Android security attacks and defenses Abhishek Dubey, Anmol Misra Boca Raton, FL CRC Press 2013 1 Online-Ressource (xx, 249 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references at the end of each chapters. - Print version record Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on. Android (Electronic resource) Operating systems (Computers) Security measures Smartphones Security measures Mobile computing Security measures Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures Téléphones intelligents ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Operating systems (Computers) ; Security measures Misra, Anmol MitwirkendeR ctb 9781439896464 Erscheint auch als Druck-Ausgabe 9781439896464 |
spellingShingle | Dubey, Abhishek Android security attacks and defenses Android (Electronic resource) Operating systems (Computers) Security measures Smartphones Security measures Mobile computing Security measures Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures Téléphones intelligents ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Operating systems (Computers) ; Security measures |
title | Android security attacks and defenses |
title_auth | Android security attacks and defenses |
title_exact_search | Android security attacks and defenses |
title_full | Android security attacks and defenses Abhishek Dubey, Anmol Misra |
title_fullStr | Android security attacks and defenses Abhishek Dubey, Anmol Misra |
title_full_unstemmed | Android security attacks and defenses Abhishek Dubey, Anmol Misra |
title_short | Android security |
title_sort | android security attacks and defenses |
title_sub | attacks and defenses |
topic | Android (Electronic resource) Operating systems (Computers) Security measures Smartphones Security measures Mobile computing Security measures Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures Téléphones intelligents ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Operating systems (Computers) ; Security measures |
topic_facet | Android (Electronic resource) Operating systems (Computers) Security measures Smartphones Security measures Mobile computing Security measures Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures Téléphones intelligents ; Sécurité ; Mesures Informatique mobile ; Sécurité ; Mesures Operating systems (Computers) ; Security measures |
work_keys_str_mv | AT dubeyabhishek androidsecurityattacksanddefenses AT misraanmol androidsecurityattacksanddefenses |