您好,欢迎光临本网站![请登录][注册会员]  
文件名称: Android Application Security Essentials
  所属分类: Android
  开发工具:
  文件大小: 4mb
  下载次数: 0
  上传时间: 2014-05-25
  提 供 者: yh***
 详细说明: Table of Contents Preface 1 Chapter 1: The Android Security Model – the Big Picture 7 Installing with care 7 Android platform architecture 9 Linux kernel 9 Middleware 11 Dalvik virtual machine 11 Application layer 11 Android application structure 12 Application signing 15 Data storage on the device 15 Crypto APIs 16 Device Administration 17 Summary 17 Chapter 2: Application Building Blocks 19 Application components 19 Activity 20 Activity declaration 20 Saving the Activity state 21 Saving user data 23 Service 23 Service declaration 24 Service modes 25 Lifecycle management 26 Binder 28 Content Provider 29 Provider declaration 30 Other security consideration 33 Table of Contents [ii ] Broadcast Receiver 34 Receiver declaration 35 Secure sending and receiving broadcasts 36 Local broadcasts 37 Intents 38 Explicit Intents 40 Implicit Intent 41 Intent Filter 42 Pending Intent 42 Summary 43 Chapter 3: Permissions 45 Permission protection levels 45 Application level permissions 53 Component level permissions 54 Activity 54 Service 54 Content Provider 55 Broadcast Receiver 56 Extending Android permissions 57 Adding a new permission 57 Creating a permission group 58 Creating a permission tree 59 Summary 60 Chapter 4: Defining the Application's Policy File 61 The AndroidManifest.xml file 61 Application policy use cases 66 Declaring application permissions 66 Declaring permissions for external applications 67 Applications running with the same Linux ID 68 External storage 70 Setting component visibility 72 Debugging 73 Backup 74 Putting it all together 74 Example checklist 75 Application level 76 Component level 77 Summary 78 Table of Contents [iii ] Chapter 5: Respect Your Users 79 Principles of data security 80 Confidentiality 80 Integrity 81 Availability 81 Identifying assets, threats, and attacks 81 What and where to store 86 End-to-end security 87 The mobile ecosystem 88 Three states of data 90 Digital rights management 92 Summary 95 Chapter 6: Your Tools – Crypto APIs 97 Terminology 98 Security providers 99 Random number generation 100 Hashing functions 101 Public key cryptography 103 RSA 104 Key generation 105 Encryption 105 Decryption 106 Padding 106 The Diffie-Hellman algorithm 106 Symmetric key cryptography 108 Stream cipher 109 Block cipher 110 Block cipher modes 111 Electronic Code Book (ECB) 111 Cipher Block Chaining (CBC) 112 Cipher Feedback Chaining (CFB) 113 Output Feedback Mode (OFB) 114 Advanced Encryption Standard (AES) 115 Message Authentication Codes 116 Summary 117 Chapter 7: Securing Application Data 119 Data storage decisions 120 Privacy 120 Data retention 121 Implementation decisions 121 Table of Contents [iv ] User preferences 123 Shared preferences 123 Creating a preference file 123 Writing preference 124 Reading preference 124 Preference Activity 125 File 125 Creating a file 126 Writing to a file 126 Reading from a file 126 File operations on an external storage 127 Cache 128 Database 129 Account manager 131 SSL/TLS 132 Installing an application on an external storage 133 Summary 136 Chapter 8: Android in the Enterprise 137 The basics 138 Understanding the Android ecosystem 138 Device administration capabilities 139 Device administration API 140 Policies 141 DeviceAdminReceiver 142 Protecting data on a device 145 Encryption 146 Backup 147 Secure connection 147 Identity 148 Next steps 149 Device specific decisions 149 Knowing your community 151 Defining boundaries 151 Android compatibility program 151 Rolling out support 152 Policy and compliance 153 FINRA 153 Android Update Alliance 154 Summary 154 Table of Contents [v ] Chapter 9: Testing for Security 155 Testing overview 156 Security testing basics 158 Security tenets 158 Security testing categories 160 Application review 160 Manual testing 161 Dynamic testing 161 Sample test case scenarios 161 Testing on the server 161 Testing the network 162 Securing data in transit 162 Secure storage 162 Validating before acting 162 The principle of least privilege 163 Managing liability 163 Cleaning up 164 Usability versus security 164 Authentication scheme 164 Thinking like a hacker 164 Integrating with caution 164 Security testing the resources 165 OWASP 165 Android utilities 165 Android Debug Bridge 165 Setting up the device 166 SQlite3 166 Dalvik Debug Monitor Service 167 BusyBox 167 Decompile APK 168 Summary 169 Chapter 10: Looking into the Future 171 Mobile commerce 172 Product discovery using a mobile device 172 Mobile payments 173 Configurations 173 PCI Standard 175 Point of Sale 176 Proximity technologies 178 Social networking 178 Table of Contents [vi ] Healthcare 180 Authentication 180 Two-factor authentication 180 Biometrics 181 Advances in hardware 182 Hardware security module 183 TrustZone 184 Mobile trusted module 185 Application architecture 185 Summary 186 Index 187 ...展开收缩
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 相关搜索: Android安全
 输入关键字,在本站1000多万海量源码库中尽情搜索: