Cargando…
Android security cookbook
Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security...
Autores principales: | , |
---|---|
Lenguaje: | eng |
Publicado: |
Packt Publ.
2013
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1663408 |
_version_ | 1780935207655833600 |
---|---|
author | Makan, Keith Alexander-Bown, Scott |
author_facet | Makan, Keith Alexander-Bown, Scott |
author_sort | Makan, Keith |
collection | CERN |
description | Android Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from |
id | cern-1663408 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2013 |
publisher | Packt Publ. |
record_format | invenio |
spelling | cern-16634082021-04-21T21:19:52Zhttp://cds.cern.ch/record/1663408engMakan, KeithAlexander-Bown, ScottAndroid security cookbookComputing and ComputersAndroid Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit fromPackt Publ.oai:cds.cern.ch:16634082013 |
spellingShingle | Computing and Computers Makan, Keith Alexander-Bown, Scott Android security cookbook |
title | Android security cookbook |
title_full | Android security cookbook |
title_fullStr | Android security cookbook |
title_full_unstemmed | Android security cookbook |
title_short | Android security cookbook |
title_sort | android security cookbook |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1663408 |
work_keys_str_mv | AT makankeith androidsecuritycookbook AT alexanderbownscott androidsecuritycookbook |