0
نام کتاب
Hacking Android

Explore every nook and cranny of the Android OS to modify your device and guard it against security threats

Srinivasa Rao Kotipalli, Mohammed A. Imran

Paperback376 Pages
PublisherPackt
Edition1
LanguageEnglish
Year2016
ISBN9781785883149
854
A5170
انتخاب نوع چاپ:
جلد سخت
777,000ت
0
جلد نرم
697,000ت
0
طلق پاپکو و فنر
707,000ت
0
مجموع:
0تومان
کیفیت متن:اورجینال انتشارات
قطع:B5
رنگ صفحات:رنگی با کادر / تصویر
پشتیبانی در روزهای تعطیل!
ارسال به سراسر کشور

#Android

#Security

#Hacking

#hackers

#attacks

#OS

#Malware

#Android_Apps

توضیحات

Key Features

  • Understand and counteract against offensive security threats to your applications
  • Maximize your device's power and potential to suit your needs and curiosity
  • See exactly how your smartphone's OS is put together (and where the seams are)


Book Description

With the mass explosion of Android mobile phones in the world, mobile devices have become an integral part of our everyday lives. Security of Android devices is a broad subject that should be part of our everyday lives to defend against ever-growing smartphone attacks. Everyone, starting with end users all the way up to developers and security professionals should care about android security.

Hacking Android is a step-by-step guide that will get you started with Android security. You'll begin your journey at the absolute basics, and then will slowly gear up to the concepts of Android rooting, application security assessments, malware, infecting APK files, and fuzzing. On this journey you'll get to grips with various tools and techniques that can be used in your everyday pentests. You'll gain the skills necessary to perform Android application vulnerability assessment and penetration testing and will create an Android pentesting lab.


What you will learn

  • Acquaint yourself with the fundamental building blocks of Android Apps in the right way
  • Pentest Android apps and perform various attacks in the real world using real case studies
  • Take a look at how your personal data can be stolen by malicious attackers
  • Understand the offensive maneuvers that hackers use
  • Discover how to defend against threats
  • Get to know the basic concepts of Android rooting
  • See how developers make mistakes that allow attackers to steal data from phones
  • Grasp ways to secure your Android apps and devices
  • Find out how remote attacks are possible on Android devices


Table of Contents

  1. Setting Up the Lab
  2. Android Rooting
  3. Fundamental Building Blocks of Android Apps
  4. Overview of Attacking Android Apps
  5. Data Storage and Its Security
  6. Server-Side Attacks
  7. Client-Side Attacks – Static Analysis Techniques
  8. Client-Side Attacks – Dynamic Analysis Techniques
  9. Android Malware
  10. Attacks on Android Devices


About the Author

Srinivasa Rao Kotipalli (@srini0x00) is a security researcher from India. He has extensive hands-on experience in performing web application, infrastructure, and mobile security assessments. He worked as a security consultant at Tata Consultancy Services India for two and a half years and later joined a start-up in Malaysia. He has delivered training sessions on web, infrastructure, and mobile penetration testing for organizations across the world, in countries such as India, Malaysia, Brunei, and Vietnam. Through responsible disclosure programs, he has reported vulnerabilities in many top-notch organizations. He holds a bachelor's degree in information technology and is OSCP certified. He blogs at www.androidpentesting.com and www.infosecinstitute.com.

Mohammed A. Imran (@secfigo) is an experienced application security engineer and the founder of null Singapore and null Hyderabad. With more than 6 years of experience in product security and consulting, he spends most of his time on penetration testing, vulnerability assessments, and source code reviews of web and mobile applications. He has helped telecom, banking, and software development houses create and maintain secure SDLC programs. He has also created and delivered training on application security and secure coding practices to students, enterprises, and government organizations. He holds a master's degree in computer science and is actively involved in the information security community and organizes meetups regularly.

دیدگاه خود را بنویسید
نظرات کاربران (0 دیدگاه)
نظری وجود ندارد.
کتاب های مشابه
هک و امنیت
444
Learning Ransomware Response & Recovery
967,000 تومان
هک و امنیت
1,089
Designing Secure Software
569,000 تومان
هک و امنیت
976
Digital Forensics and Incident Response
979,000 تومان
هک و امنیت
1,104
Pentesting Azure Applications
434,000 تومان
Machine Learning
462
Introduction to Machine Learning with Security
969,000 تومان
هک و امنیت
624
Cybersecurity Beginner's Guide
590,000 تومان
هک و امنیت
1,083
Cybersecurity Attacks – Red Team Strategies
1,075,000 تومان
هک و امنیت
993
Threat Modeling
464,000 تومان
هک و امنیت
1,154
Hacking the Hacker
558,000 تومان
هک و امنیت
3,275
Black Hat Python
434,000 تومان
قیمت
منصفانه
ارسال به
سراسر کشور
تضمین
کیفیت
پشتیبانی در
روزهای تعطیل
خرید امن
و آسان
آرشیو بزرگ
کتاب‌های تخصصی
هـر روز با بهتــرین و جــدیــدتـرین
کتاب های روز دنیا با ما همراه باشید
آدرس
پشتیبانی
مدیریت
ساعات پاسخگویی
درباره اسکای بوک
دسترسی های سریع
  • راهنمای خرید
  • راهنمای ارسال
  • سوالات متداول
  • قوانین و مقررات
  • وبلاگ
  • درباره ما
چاپ دیجیتال اسکای بوک. 2024-2022 ©