Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Android apps security = mitigate hac...
~
Gunasekera, Sheran.
Linked to FindBook
Google Book
Amazon
博客來
Android apps security = mitigate hacking attacks and security breaches /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Android apps security/ by Sheran Gunasekera.
Reminder of title:
mitigate hacking attacks and security breaches /
Author:
Gunasekera, Sheran.
Published:
Berkeley, CA :Apress : : 2020.,
Description:
xv, 294 p. :ill., digital ;24 cm.
[NT 15003449]:
1. Introduction -- 2. Recap of Secure Development Principles -- 3. App Licensing and SafetyNet -- 4. Securing Your Apps at Scale -- 5. Hacking Your App -- 6. The Tool Bag -- 7. Hacking Your App #2. 8. Rooting Your Android Device -- 9. Bypassing SSL Pinning -- 10. Looking Ahead.
Contained By:
Springer Nature eBook
Subject:
Application software - Security measures. -
Online resource:
https://doi.org/10.1007/978-1-4842-1682-8
ISBN:
9781484216828
Android apps security = mitigate hacking attacks and security breaches /
Gunasekera, Sheran.
Android apps security
mitigate hacking attacks and security breaches /[electronic resource] :by Sheran Gunasekera. - Second edition. - Berkeley, CA :Apress :2020. - xv, 294 p. :ill., digital ;24 cm.
1. Introduction -- 2. Recap of Secure Development Principles -- 3. App Licensing and SafetyNet -- 4. Securing Your Apps at Scale -- 5. Hacking Your App -- 6. The Tool Bag -- 7. Hacking Your App #2. 8. Rooting Your Android Device -- 9. Bypassing SSL Pinning -- 10. Looking Ahead.
Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. You will: Identify data that should be secured Use the Android APIs to ensure confidentiality and integrity of data Build secure apps for the enterprise Implement Public Key Infrastructure and encryption APIs in apps Master owners, access control lists, and permissions to allow user control over app properties Manage authentication, transport layer encryption, and server-side security.
ISBN: 9781484216828
Standard No.: 10.1007/978-1-4842-1682-8doiSubjects--Uniform Titles:
Android (Electronic resource)
Subjects--Topical Terms:
821342
Application software
--Security measures.
LC Class. No.: QA76.76.A65
Dewey Class. No.: 005.1
Android apps security = mitigate hacking attacks and security breaches /
LDR
:02053nmm a2200337 a 4500
001
2256196
003
DE-He213
005
20200831075259.0
006
m d
007
cr nn 008maaau
008
220420s2020 cau s 0 eng d
020
$a
9781484216828
$q
(electronic bk.)
020
$a
9781484216811
$q
(paper)
024
7
$a
10.1007/978-1-4842-1682-8
$2
doi
035
$a
978-1-4842-1682-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.A65
072
7
$a
UMS
$2
bicssc
072
7
$a
COM051460
$2
bisacsh
072
7
$a
UMS
$2
thema
082
0 4
$a
005.1
$2
23
090
$a
QA76.76.A65
$b
G975 2020
100
1
$a
Gunasekera, Sheran.
$3
3526261
245
1 0
$a
Android apps security
$h
[electronic resource] :
$b
mitigate hacking attacks and security breaches /
$c
by Sheran Gunasekera.
250
$a
Second edition.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2020.
300
$a
xv, 294 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
1. Introduction -- 2. Recap of Secure Development Principles -- 3. App Licensing and SafetyNet -- 4. Securing Your Apps at Scale -- 5. Hacking Your App -- 6. The Tool Bag -- 7. Hacking Your App #2. 8. Rooting Your Android Device -- 9. Bypassing SSL Pinning -- 10. Looking Ahead.
520
$a
Gain the information you need to design secure, useful, high-performing apps that expose end-users to as little risk as possible. This book shows you how to best design and develop Android apps with security in mind: explore concepts that you can use to secure apps and how you can use and incorporate these security features into your apps. You will: Identify data that should be secured Use the Android APIs to ensure confidentiality and integrity of data Build secure apps for the enterprise Implement Public Key Infrastructure and encryption APIs in apps Master owners, access control lists, and permissions to allow user control over app properties Manage authentication, transport layer encryption, and server-side security.
630
0 0
$a
Android (Electronic resource)
$3
1074183
650
0
$a
Application software
$x
Security measures.
$3
821342
650
0
$a
Application software
$x
Development.
$3
539563
650
0
$a
Mobile apps.
$3
2111768
650
1 4
$a
Mobile Computing.
$3
3201332
650
2 4
$a
Programming Techniques.
$3
892496
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/978-1-4842-1682-8
950
$a
Professional and Applied Computing (SpringerNature-12059)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9411832
電子資源
11.線上閱覽_V
電子書
EB QA76.76.A65
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login