Android Security Internals: An In-Depth Guide to Android’s Security Architecture

 

“I honestly didn’t believe I’d learn much from the book because I’ve been working on Android security for many years. This belief could not have been more wrong. Android Security Internals has earned a permanent spot on my office bookshelf.”Jon “jcase” Sawyer, from the Foreword

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals until now. Continue reading “Android Security Internals: An In-Depth Guide to Android’s Security Architecture” »

Android Security: Attacks and Defenses

 

Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues.

Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler. Continue reading “Android Security: Attacks and Defenses” »

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

 

If youre an app developer with a solid foundation in Objective-C, this book is an absolute mustchances are very high that your companys iOS applications are vulnerable to attack. Thats because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers arent aware of. Continue reading “Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It” »