×







We sell 100% Genuine & New Books only!

Android Hacker'S Handbook at Meripustak

Android Hacker'S Handbook by JOSHUA J DRAKE and PAU OLIVA FORA and ZACH LANIER and COLLIN MULLINER and STEPHEN A RIDLEY and GEORG WICHERSKI, John Wiley


  • Retail Price: ₹ 0/- [ 0% off ]

    Seller Price: ₹ 0/-

Sold By: Meripustak

Offer 1: Get 0 % + Flat ₹ 50 discount on shopping of ₹ 1000 [Use Code: 0]

Offer 2: Get 0 % + Flat ₹ 50 discount on shopping of ₹ 1500 [Use Code: 0]

Offer 3: Get 0 % + Flat ₹ 50 discount on shopping of ₹ 5000 [Use Code: 0]

Free Shipping (for orders above ₹ 499) *T&C apply.

Out of Stock
General Information  
Author(s)JOSHUA J DRAKE and PAU OLIVA FORA and ZACH LANIER and COLLIN MULLINER and STEPHEN A RIDLEY and GEORG WICHERSKI
PublisherJohn Wiley
ISBN9788126549221
Pages576
BindingPaperback
LanguageEnglish
Publish YearJanuary 2014

Description

John Wiley Android Hacker'S Handbook by JOSHUA J DRAKE and PAU OLIVA FORA and ZACH LANIER and COLLIN MULLINER and STEPHEN A RIDLEY and GEORG WICHERSKI

The Android Hacker's Handbook presents the specifics of the Android operating system from a security point of view. It explains how the operating system works, security risks associated with it and the overall security architecture of the operating system. It explains how vulnerabilities can be found in and exploits developed for, various components of the system. There are no other books that come close to covering Android security on this level. The book is written by a group of some of the world's foremost Android security researchers. The ideal reader for this book would be someone who is interested in understanding the intricacies of the security of the Android ecosystem. This includes both implementation details as well as complexities introduced by the open nature of the OS. The person may be a security researcher, mobile device administrator, or consultant responsible for evaluating the security of the Android OS. Also, this person could be an Android application developer hoping to avoid common security pitfalls.



Book Successfully Added To Your Cart