8,95 €
8,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
4 °P sammeln
8,95 €
8,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
4 °P sammeln
Als Download kaufen
8,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
4 °P sammeln
Jetzt verschenken
8,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
4 °P sammeln
  • Format: ePub

With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. Youll learn how to identify and manage the risks inherent in your design, and work to minimize a hackers opportunity to compromise your app and steal user data.How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this…mehr

  • Geräte: eReader
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 1.18MB
  • FamilySharing(5)
Produktbeschreibung
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you need to design and implement robust, rugged, and secure apps for any Android device. Youll learn how to identify and manage the risks inherent in your design, and work to minimize a hackers opportunity to compromise your app and steal user data.How is the Android platform structured to handle security? What services and tools are available to help you protect data? Up until now, no single resource has provided this vital information. With this guide, youll learn how to address real threats to your app, whether or not you have previous experience with security issues.Examine Androids architecture and security model, and how it isolates the filesystem and databaseLearn how to use Android permissions and restricted system APIsExplore Android component types, and learn how to secure communications in a multi-tier appUse cryptographic tools to protect data stored on an Android deviceSecure the data transmitted from the device to other parties, including the servers that interact with your app

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Jeff is a senior security engineer at a major financial institution based on Baltimore, Maryland, where he works to secure customer and firm data. A major component of Jeff's job is working with developers to enhance the security of applications through education, code reviews, and deployment of modern application security techniques and frameworks. He also develops security-related applications, primarily using the Java EE platform. Prior to this position and a comparable one at another financial services firm, Jeff worked at the National Security Agency on similar application security projects and development efforts, focused on information assurance. Jeff has been a member of the Adjunct Faculty at the University of Delaware since 2000, teaching an object-oriented programming with Java course for ten years and, more recently, a course on Secure Software Design. He has been a lifeguard since 1993, and an instructor since 1995. Additionally, Jeff is an amateur triathlete, competing at the sprint, Olympic, and 70.3 distances.