語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Android apps security = mitigate hac...
~
Gunasekera, Sheran.
FindBook
Google Book
Amazon
博客來
Android apps security = mitigate hacking attacks and security breaches /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Android apps security/ by Sheran Gunasekera.
其他題名:
mitigate hacking attacks and security breaches /
作者:
Gunasekera, Sheran.
出版者:
Berkeley, CA :Apress : : 2020.,
面頁冊數:
xv, 294 p. :ill., digital ;24 cm.
內容註:
1. Introduction -- 2. Recap of Secure Development Principles -- 3. App Licensing and SafetyNet -- 4. Securing Your Apps at Scale -- 5. Hacking Your App -- 6. The Tool Bag -- 7. Hacking Your App #2. 8. Rooting Your Android Device -- 9. Bypassing SSL Pinning -- 10. Looking Ahead.
Contained By:
Springer Nature eBook
標題:
Application software - Security measures. -
電子資源:
https://doi.org/10.1007/978-1-4842-1682-8
ISBN:
9781484216828
Android apps security = mitigate hacking attacks and security breaches /
Gunasekera, Sheran.
Android apps security
mitigate hacking attacks and security breaches /[electronic resource] :by Sheran Gunasekera. - Second edition. - Berkeley, CA :Apress :2020. - xv, 294 p. :ill., digital ;24 cm.
1. Introduction -- 2. Recap of Secure Development Principles -- 3. App Licensing and SafetyNet -- 4. Securing Your Apps at Scale -- 5. Hacking Your App -- 6. The Tool Bag -- 7. Hacking Your App #2. 8. Rooting Your Android Device -- 9. Bypassing SSL Pinning -- 10. Looking Ahead.
Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. You will: Identify data that should be secured Use the Android APIs to ensure confidentiality and integrity of data Build secure apps for the enterprise Implement Public Key Infrastructure and encryption APIs in apps Master owners, access control lists, and permissions to allow user control over app properties Manage authentication, transport layer encryption, and server-side security.
ISBN: 9781484216828
Standard No.: 10.1007/978-1-4842-1682-8doiSubjects--Uniform Titles:
Android (Electronic resource)
Subjects--Topical Terms:
821342
Application software
--Security measures.
LC Class. No.: QA76.76.A65
Dewey Class. No.: 005.1
Android apps security = mitigate hacking attacks and security breaches /
LDR
:02053nmm a2200337 a 4500
001
2256196
003
DE-He213
005
20200831075259.0
006
m d
007
cr nn 008maaau
008
220420s2020 cau s 0 eng d
020
$a
9781484216828
$q
(electronic bk.)
020
$a
9781484216811
$q
(paper)
024
7
$a
10.1007/978-1-4842-1682-8
$2
doi
035
$a
978-1-4842-1682-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.A65
072
7
$a
UMS
$2
bicssc
072
7
$a
COM051460
$2
bisacsh
072
7
$a
UMS
$2
thema
082
0 4
$a
005.1
$2
23
090
$a
QA76.76.A65
$b
G975 2020
100
1
$a
Gunasekera, Sheran.
$3
3526261
245
1 0
$a
Android apps security
$h
[electronic resource] :
$b
mitigate hacking attacks and security breaches /
$c
by Sheran Gunasekera.
250
$a
Second edition.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xv, 294 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1. Introduction -- 2. Recap of Secure Development Principles -- 3. App Licensing and SafetyNet -- 4. Securing Your Apps at Scale -- 5. Hacking Your App -- 6. The Tool Bag -- 7. Hacking Your App #2. 8. Rooting Your Android Device -- 9. Bypassing SSL Pinning -- 10. Looking Ahead.
520
$a
Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. You will: Identify data that should be secured Use the Android APIs to ensure confidentiality and integrity of data Build secure apps for the enterprise Implement Public Key Infrastructure and encryption APIs in apps Master owners, access control lists, and permissions to allow user control over app properties Manage authentication, transport layer encryption, and server-side security.
630
0 0
$a
Android (Electronic resource)
$3
1074183
650
0
$a
Application software
$x
Security measures.
$3
821342
650
0
$a
Application software
$x
Development.
$3
539563
650
0
$a
Mobile apps.
$3
2111768
650
1 4
$a
Mobile Computing.
$3
3201332
650
2 4
$a
Programming Techniques.
$3
892496
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-1682-8
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9411832
電子資源
11.線上閱覽_V
電子書
EB QA76.76.A65
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入