𝔖 Scriptorium
✦   LIBER   ✦

📁

Android security internals an in-depth guide to Android's security architecture

✍ Scribed by Elenkov, Nikolay;Root, Kenny;Sawyer, Jon


Publisher
No Starch Press
Year
2015
Tongue
English
Leaves
434
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book describes Android security architecture, including the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. Coverage includes: how Android permissions are declared, used, and enforced; how Android manages application packages and employs code signing to verify their authenticity; how Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks; Android's credential storage system and APIs, which let applications store cryptographic keys securely; the online account management framework and how Google accounts integrate with Android; the implementation of verified boot, disk encryption, lockscreen, and other device security features; and how Android's bootloader and recovery OS are used to perform full system updates, and how to obtain root access. --

✦ Subjects


Informatique mobile--Sécurité--Mesures;Systèmes d'exploitation (Ordinateurs)--Sécurité--Mesures;Téléphones intelligents--Sécurité--Mesures;Livres électroniques;Android (Electronic resource);Systèmes d'exploitation (Ordinateurs) -- Sécurité -- Mesures;Téléphones intelligents -- Sécurité -- Mesures;Informatique mobile -- Sécurité -- Mesures


📜 SIMILAR VOLUMES


Android Security Internals: An In-Depth
✍ Nikolay Elenkov 📂 Library 📅 2014 🏛 No Starch Press 🌐 English

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals, top Android securi

Android Security Internals: An In-Depth
✍ Nikolay Elenkov 📂 Library 📅 2014 🏛 No Starch Press 🌐 English

<div><p>"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. <i>Android Security Internals</i> has earned a permanent spot on my office bookshelf."<b>—Jon "jcase" Sawyer, from the Foreword</b

Android Security Internals: An In-Depth
✍ Nikolay Elenkov 📂 Library 📅 2014 🏛 No Starch Press 🌐 English

<div><p>"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. <i>Android Security Internals</i> has earned a permanent spot on my office bookshelf."<b>—Jon "jcase" Sawyer, from the Foreword</b

Android Security Internals: An In-Depth
✍ Nikolay Elenkov 📂 Library 📅 2014 🏛 No Starch Press 🌐 English

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In <i>Android Security Internals</i>, top Android