There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals, top Android securi
Android security internals an in-depth guide to Android's security architecture
✍ Scribed by Elenkov, Nikolay;Root, Kenny;Sawyer, Jon
- Publisher
- No Starch Press
- Year
- 2015
- Tongue
- English
- Leaves
- 434
- Category
- Library
No coin nor oath required. For personal study only.
✦ Synopsis
This book describes Android security architecture, including the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. Coverage includes: how Android permissions are declared, used, and enforced; how Android manages application packages and employs code signing to verify their authenticity; how Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks; Android's credential storage system and APIs, which let applications store cryptographic keys securely; the online account management framework and how Google accounts integrate with Android; the implementation of verified boot, disk encryption, lockscreen, and other device security features; and how Android's bootloader and recovery OS are used to perform full system updates, and how to obtain root access. --
✦ Subjects
Informatique mobile--Sécurité--Mesures;Systèmes d'exploitation (Ordinateurs)--Sécurité--Mesures;Téléphones intelligents--Sécurité--Mesures;Livres électroniques;Android (Electronic resource);Systèmes d'exploitation (Ordinateurs) -- Sécurité -- Mesures;Téléphones intelligents -- Sécurité -- Mesures;Informatique mobile -- Sécurité -- Mesures
📜 SIMILAR VOLUMES
<div><p>"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. <i>Android Security Internals</i> has earned a permanent spot on my office bookshelf."<b>—Jon "jcase" Sawyer, from the Foreword</b
<div><p>"I honestly didn't believe I'd learn much from the book because I've been working on Android security for many years. This belief could not have been more wrong. <i>Android Security Internals</i> has earned a permanent spot on my office bookshelf."<b>—Jon "jcase" Sawyer, from the Foreword</b
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In <i>Android Security Internals</i>, top Android