05617nam 2200697 450 991081597740332120230912132719.01-4571-8549-01-59327-641-9(CKB)3710000000280873(EBL)1842161(SSID)ssj0001399128(PQKBManifestationID)11801414(PQKBTitleCode)TC0001399128(PQKBWorkID)11450237(PQKB)10955523(Au-PeEL)EBL1842161(CaPaEBR)ebr10986549(OCoLC)896796548(Au-PeEL)EBL6049103(OCoLC)1156114251(CaSebORM)9781457185496(MiAaPQ)EBC1842161(MiAaPQ)EBC6049103(EXLCZ)99371000000028087320141201h20152015 uy| 0engurunu|||||txtccrAndroid security internals an in-depth guide to android's security architecture /by Nikolay Elenkov ; [foreword by Jon Sawyer]1st editionSan Francisco :No Starch Press,[2015]©20151 online resource (434 p.)Includes index.1-59327-581-1 Includes bibliographical references and index.About the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; SummaryChapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package ManagementAndroid Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest UserUser Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; CipherMacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure SocketsPeer AuthenticationThere are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals-until now.In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and deviceOperating systems (Computers)Security measuresSmartphonesSecurity measuresMobile computingSecurity measuresOperating systems (Computers)Security measures.SmartphonesSecurity measures.Mobile computingSecurity measures.004.1675Elenkov Nikolay747673MiAaPQMiAaPQMiAaPQBOOK9910815977403321Android security internals3990200UNINA01633cam a22002897i 450099100319525970753620250430130140.0940712s1790 fr af b 000 0 fre db14296020-39ule_instCICOGNARA-A2012-0258ExLBibl. Interfacoltà T. PellegrinoitaChery, Philippe<1759-1838>717866Recherches sur les costumes et sur les théatres de toutes les nations, tant anciennes que modernes.Ouvrage utile aux peintres, statuaires, architectes, décorateurs, comédiens, costumiers ...avec des estampes en couleur et au lavis, dessinées par M. Chéry, et gravées par P. M. Alix.A Paris :chez M. Drouhin,1790.2 v. :ill., tav.; 4° (28 cm).Incisioni calcografiche.Riproduzione in microfiche dell'originale conservato presso la Biblioteca Apostolica VaticanaIndicazioni bibliografiche nelle note.Alix, Pierre-Michel<1762-1817>Leopoldo Cicognara Program :Biblioteca Cicognara[microform] : literary sources in the history of art and kindred subjectsCatalogo ragionato dei libri d'arte e d'antichità / Leopoldo Cicognara.b1429602001-04-2228-07-16991003195259707536LE002 SB Raccolta Cicognara, mcrf 17750le002E0.00no 110000.i1576751628-07-16Recherches sur les costumes et sur les théatres de toutes les nations, tant anciennes que modernes1391431UNISALENTOle00228-07-16mg -frefr 01