Cargando…
Android malware and analysis
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware thr...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Taylor and Francis
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1967830 |
_version_ | 1780944616235728896 |
---|---|
author | Dunham, Ken |
author_facet | Dunham, Ken |
author_sort | Dunham, Ken |
collection | CERN |
description | The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.This tact |
id | cern-1967830 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Taylor and Francis |
record_format | invenio |
spelling | cern-19678302021-04-21T20:51:03Zhttp://cds.cern.ch/record/1967830engDunham, KenAndroid malware and analysisComputing and ComputersThe rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate demand for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.This tactTaylor and Francisoai:cds.cern.ch:19678302014 |
spellingShingle | Computing and Computers Dunham, Ken Android malware and analysis |
title | Android malware and analysis |
title_full | Android malware and analysis |
title_fullStr | Android malware and analysis |
title_full_unstemmed | Android malware and analysis |
title_short | Android malware and analysis |
title_sort | android malware and analysis |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1967830 |
work_keys_str_mv | AT dunhamken androidmalwareandanalysis |