- Out-of-Stock
Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski
Original title: Android Hacker's Handbook
Translation: Andrzej Stefański
ISBN: 978-83-246-9940-7
Date of issue: 2015-01-23
Number of pages: 520
Format: 168x237 mm
Defend your system against attack!
The Android system is an undeniable leader among operating systems for mobile devices. However, being a leader has one major disadvantage - everyone wants to break his security. If you are a specialist responsible for network security, if you are an administrator responsible for the security of mobile devices, then you've come across a book that will become your obligatory reading for the next few days!
Thanks to it, you will learn about the operation of the Android system and the security architecture implemented in it. In the following chapters, you will learn to recognize the details of security implementation and the complications resulting from the fact that Android is an open system. Once you've acquired solid theoretical foundations, you'll go on to analyze the various attack techniques for devices running Android. In addition, you will learn the possible attack planes, publicly available exploits and the weaknesses of the system's kernel. This book must be on the shelf of everyone who is not indifferent to the security of the Android platform!
With this book you will learn:
Mandatory reading of specialists responsible for the security of the Android platform!
Table of Contents
About the authors (13)
About the content-related corrector (15)
Thanks (17)
Introduction (19)
Chapter 1. A Look at the Ecosystem (25)
Chapter 2. Android security design and architecture (47)
Chapter 3. Unlocking the device (77)
Chapter 4. Application security overview (101)
Chapter 5. Android attack planes (141)
Chapter 6. Searching for weaknesses using fuzzing (183)
Chapter 7. Searching for errors and analyzing weaknesses (209)
Chapter 8. Using software running in the user space (263)
Chapter 9. Return Oriented Programming (289)
Chapter 10. Hacking and attacking the kernel (317)
Chapter 11. Attacking RIL (311)
Chapter 12. Mitigation Mechanisms (333)
Chapter 13. Hardware attacks (363)
Appendix A. Tools (419)
Appendix B. Open source code repositories (433)
Appendix C. Sources (443)
Index (501)
AQUARIUM DRIVER - A SET OF PRINTED TILES AND A PROGRAMMED SYSTEM
No product available!
Assembled fan controller with a squirrel-cage motor. AVT1813 C
No product available!
No product available!
No product available!
The set allows introducing distance, ambient lighting and gesture analysis into the subject using the VL6180X sensor. NUCLEO-L053R8 plate in set with VL6180X expansion board. P-NUCLEO-6180X2
No product available!
No product available!
Camera module with IMX219 sensor with a resolution of 8 MP equipped with programmable focus, without IR filter. Designed for NVIDIA Jetson Nano and Raspberry Pi CM. ArduCAM B0189
No product available!
No product available!
No product available!
SUPERLUMISATION MODULE RACK 3x3LED RED 20MA - A KIT FOR INDEPENDENT INSTALLATION
No product available!
No product available!
Module with 6 5x7 LED matrix displays designed to work with the Raspberry Pi. It uses IS31FL3730 drivers and communicates via the I2C interface. Pimoroni PIM187
No product available!
KAmduino UNO is a development board with functionality and dimensions typical for Arduino UNO. Thanks to the built-in ATmega328P microcontroller and the FT231X chipset, the board can be programmed via a USB interface using the Arduino environment. KAmduino UNO
No product available!
No product available!
ROSA3D filament made of high-quality PET-G granules. 0.8 kg of filament with a diameter of 1.75 mm is wound on the spool. ROSA3D PET-G Standard Black
No product available!
No product available!
Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski