Cargando…

Android security cookbook

Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security...

Descripción completa

Detalles Bibliográficos
Autores principales: Makan, Keith, Alexander-Bown, Scott
Lenguaje:eng
Publicado: Packt Publ. 2013
Materias:
Acceso en línea:http://cds.cern.ch/record/1663408
_version_ 1780935207655833600
author Makan, Keith
Alexander-Bown, Scott
author_facet Makan, Keith
Alexander-Bown, Scott
author_sort Makan, Keith
collection CERN
description Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from
id cern-1663408
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2013
publisher Packt Publ.
record_format invenio
spelling cern-16634082021-04-21T21:19:52Zhttp://cds.cern.ch/record/1663408engMakan, KeithAlexander-Bown, ScottAndroid security cookbookComputing and ComputersAndroid Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit fromPackt Publ.oai:cds.cern.ch:16634082013
spellingShingle Computing and Computers
Makan, Keith
Alexander-Bown, Scott
Android security cookbook
title Android security cookbook
title_full Android security cookbook
title_fullStr Android security cookbook
title_full_unstemmed Android security cookbook
title_short Android security cookbook
title_sort android security cookbook
topic Computing and Computers
url http://cds.cern.ch/record/1663408
work_keys_str_mv AT makankeith androidsecuritycookbook
AT alexanderbownscott androidsecuritycookbook