- Out-of-Stock
Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski
Original title: Android Hacker's Handbook
Translation: Andrzej Stefański
ISBN: 978-83-246-9940-7
Date of issue: 2015-01-23
Number of pages: 520
Format: 168x237 mm
Defend your system against attack!
The Android system is an undeniable leader among operating systems for mobile devices. However, being a leader has one major disadvantage - everyone wants to break his security. If you are a specialist responsible for network security, if you are an administrator responsible for the security of mobile devices, then you've come across a book that will become your obligatory reading for the next few days!
Thanks to it, you will learn about the operation of the Android system and the security architecture implemented in it. In the following chapters, you will learn to recognize the details of security implementation and the complications resulting from the fact that Android is an open system. Once you've acquired solid theoretical foundations, you'll go on to analyze the various attack techniques for devices running Android. In addition, you will learn the possible attack planes, publicly available exploits and the weaknesses of the system's kernel. This book must be on the shelf of everyone who is not indifferent to the security of the Android platform!
With this book you will learn:
Mandatory reading of specialists responsible for the security of the Android platform!
Table of Contents
About the authors (13)
About the content-related corrector (15)
Thanks (17)
Introduction (19)
Chapter 1. A Look at the Ecosystem (25)
Chapter 2. Android security design and architecture (47)
Chapter 3. Unlocking the device (77)
Chapter 4. Application security overview (101)
Chapter 5. Android attack planes (141)
Chapter 6. Searching for weaknesses using fuzzing (183)
Chapter 7. Searching for errors and analyzing weaknesses (209)
Chapter 8. Using software running in the user space (263)
Chapter 9. Return Oriented Programming (289)
Chapter 10. Hacking and attacking the kernel (317)
Chapter 11. Attacking RIL (311)
Chapter 12. Mitigation Mechanisms (333)
Chapter 13. Hardware attacks (363)
Appendix A. Tools (419)
Appendix B. Open source code repositories (433)
Appendix C. Sources (443)
Index (501)
LCD 2x16, 84x44mm, LED backlight (yellow-green), enhanced temperature range, fast
No product available!
LCD 4x12, 37x48.5mm, LED backlight (RGB), FSTN, 5.88x2.90mm character
No product available!
LCD 4x20, 98x60mm, LED backlight (WHITE), FFSTN, backlight current I=60mA (U=5V)
No product available!
LCD 4x20, 98x60mm, LED backlight (WHITE), FSTN, enhanced temperature range, cyryllic, Pb-free, backlight current I=60mA (U=5V)
No product available!
LCD 4x20, 98x60mm, LED backlight (WHITE) NEGATIVE BLUE, STN, enhanced temperature range, 2-LED.
No product available!
LCD 4x20, 146x62,5mm, LED backlight (WHITE), FFSTN, 9.22mm character, backlight current I=120mA (5V)
No product available!
No product available!
No product available!
LCD display with controller CS1621 / HT1621 serial protocol, 66x26x5 mm
No product available!
TFT COLOR 3.5", 92x78.4mm, ACTEL IGLOO video memory controller, easy-to-use static interface, 8-bit color, 320x240, integrated touchpanel (ZIF20 connector, R=1mm)
No product available!
No product available!
Graphic LCD 128x64, 80x54mm, Backlight (yellow-green), COG, STN, 3.3V, ST7565R
No product available!
Graphic LCD 128x64, 55x36.5mm, COG, FSTN, 3.3V, UC1601, 2-LED 36mA backlight
No product available!
Graphic LCD 240x64, 134.6x55.1mm, FFSTN, 3.3V, UC1608, white backlight
No product available!
Graphic LCD 240x128, 101.3x76.3mm, COG, negative blue, 3.3V, UC1608
No product available!
Graphic LCD 240x128, 101.3x76.3mm, COG, FSTN, 3.3V, UC1608, white backlight
No product available!
Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A. Ridley, Georg Wicherski