LEADER 00743nam 2200253 450 001 9910473254703321 005 20210601110802.0 010 $a9788858143858 100 $a20210601d2021----u y0engy50 ba 101 0 $aita 102 $aIT 105 0 $a 00 200 1 $aNoi schiavisti$ecome siamo diventati complici dello sfruttamento di massa$fValentina Furlanetto 210 $aRoma ; Bari$cLaterza$d2021 215 $a199 p.$d2 cm 225 $a<>robinson$eletture 610 0 $aMercato del lavoro$aItalia$aSec. 21 676 $a36.36$v22$zita 700 1$aFurlanetto,$bValentina$0765403 912 $a9910473254703321 952 $a306.36 FUR 1$b8407$fbfs 959 $aBFS 996 $aNoi schiavisti$91799798 997 $aUNINA LEADER 05338nam 22006491 450 001 9910790736703321 005 20200520144314.0 010 $a1-78216-717-X 035 $a(CKB)2550000001175408 035 $a(EBL)1593872 035 $a(SSID)ssj0001139376 035 $a(PQKBManifestationID)11626133 035 $a(PQKBTitleCode)TC0001139376 035 $a(PQKBWorkID)11184136 035 $a(PQKB)10310121 035 $a(Au-PeEL)EBL1593872 035 $a(CaPaEBR)ebr10825546 035 $a(CaONFJC)MIL556676 035 $a(OCoLC)866840167 035 $a(CaSebORM)9781782167167 035 $a(MiAaPQ)EBC1593872 035 $a(PPN)228031117 035 $a(EXLCZ)992550000001175408 100 $a20140104d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAndroid security cookbook /$fKeith Makan, Scott Alexander-Brown 205 $a1st edition 210 1$aBirmingham :$cPackt Publishing,$d2013. 215 $a1 online resource (350 p.) 300 $aIncludes index. 311 $a1-78216-716-1 311 $a1-306-25425-6 327 $aCover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB 327 $aChapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers 327 $aDetermining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications 327 $aMan in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode 327 $aDecompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction 327 $aUsing cryptography libraries 330 $aAndroid Security Cookbook' breaks down and enumerates the processes used to exploit and remediate Android app security vulnerabilities in the form of detailed recipes and walkthroughs.""Android Security Cookbook"" is aimed at anyone who is curious about Android app security and wants to be able to take the necessary practical measures to protect themselves; this means that Android application developers, security researchers and analysts, penetration testers, and generally any CIO, CTO, or IT managers facing the impeding onslaught of mobile devices in the business environment will benefit from 606 $aOperating systems (Computers)$xSecurity measures 606 $aSmartphones$xSecurity measures 615 0$aOperating systems (Computers)$xSecurity measures. 615 0$aSmartphones$xSecurity measures. 676 $a005.258 700 $aMakan$b Keith$01492240 701 $aAlexander-Brown$b Scott$01510052 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910790736703321 996 $aAndroid security cookbook$93742345 997 $aUNINA LEADER 02150oas 2200865 a 450 001 9910143943303321 005 20260106110105.0 011 $a1572-9435 035 $a(DE-599)ZDB2015868-3 035 $a(DE-599)2015868-3 035 $a(OCoLC)41979050 035 $a(CONSER) 2004233297 035 $a(CKB)954925457016 035 $ahttps://learn360.infobase.com/titles/66877?aid= 035 $ahttps://learn360.infobase.com/titles/82550?aid= 035 $ahttps://learn360.infobase.com/titles/211685?aid= 035 $a(EXLCZ)99954925457016 100 $a19990729a19729999 sy a 101 0 $aeng 135 $aurmnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aTransportation 210 $aNorwell, MA $cKluwer Academic Publishers 210 3 $a[New York] $cSpringer US 300 $aRefereed/Peer-reviewed 311 08$aTransportation 0049-4488 531 0 $aTransportation 606 $aTransportation$vPeriodicals 606 $aTransportation$vPeriodicals 606 $aTransport$xPe?riodiques 606 $aTransportation$2fast$3(OCoLC)fst01155007 606 $aTransport$2thub 608 $aPeriodicals.$2fast 608 $aRevistes electròniques.$2thub 615 0$aTransportation 615 0$aTransportation 615 6$aTransport$xPe?riodiques. 615 7$aTransportation. 615 7$aTransport. 676 $a380.5 801 0$bF#A 801 1$bF#A 801 2$bOCLCQ 801 2$bGUA 801 2$bOCLCQ 801 2$bVRC 801 2$bU9S 801 2$bGUA 801 2$bOCLCQ 801 2$bOCLCO 801 2$bOCLCQ 801 2$bBUF 801 2$bOCLCF 801 2$bOCLCO 801 2$bOCLCQ 801 2$bAU@ 801 2$bU3W 801 2$bNJT 801 2$bVT2 801 2$bDLC 801 2$bOCLCO 801 2$bSFB 801 2$bUEJ 801 2$bSRU 801 2$bOCLCQ 801 2$bIOY 801 2$bQGK 801 2$bSXB 801 2$bOCLCQ 906 $aJOURNAL 912 $a9910143943303321 996 $aTransportation$9787417 997 $aUNINA