Android hacker's handbook
Material type: TextPublication details: Indianapolis : Wiley, ©2014Description: xxix, 545 p. : 24 cm. illISBN:- 9781118608647
- 005.8 DRA-A
- QA76.774.A53 D73 2014
Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | Course reserves |
---|---|---|---|---|---|---|---|---|
Books | IIITD Reference | Computer Science and Engineering | REF 005.8 DRA-A (Browse shelf(Opens below)) | Not for loan | 011207 |
Browsing IIITD shelves, Shelving location: Reference, Collection: Computer Science and Engineering Close shelf browser (Hides shelf browser)
REF 005.8 CRA-S Secure multiparty computation and secret sharing | REF 005.8 DAV-I Implementing SSL/TLS using cryptography and PKI | REF 005.8 DAV-N Network forensics : | REF 005.8 DRA-A Android hacker's handbook | REF 005.8 ELI-M Malware, rootkits & botnets | REF 005.8 FER-S Security patterns in practice : | REF 005.8 FOR-C Cryptography and network security |
Includes bibliographical references and index.
Looking at the ecosystem -- Android security design and architecture -- Rooting your device -- Reviewing application security -- Understanding Android's attack surface -- Finding vulnerabilities with fuzz testing -- Debugging and analyzing vulnerabilities -- Exploiting user space software -- Return oriented programming -- Hacking and attacking the kernel -- Attacking the radio interface layer -- Exploit mitigations -- Hardware attacks.
There are no comments on this title.