Android Best Practices / / by Godfrey Nolan, David Truxall, Raghav Sood, Onur Cinar |
Autore | Nolan Godfrey |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 |
Descrizione fisica | 1 online resource (223 p.) |
Disciplina |
004
004.6 005.258 |
Soggetto topico |
Mobile computing
Special purpose computers Mobile Computing Special Purpose and Application-Based Systems |
ISBN | 1-4302-5858-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Contents at a Glance""; ""Contents""; ""About the Authors""; ""About the Technical Reviewers""; ""Chapter 1: Before You Start""; ""Introduction to Android""; ""Who Should Read This Book?""; ""What You Need Before You Begin""; ""An Actual Android Application""; ""A Working Development Environment""; ""All the Bells and Whistles""; ""Source Code for the Sample Application""; ""What�s in This Book""; ""Chapter 2: Android Patterns""; ""UI Design Patterns""; ""Holo""; ""ActionBarSherlock Navigation""; ""Designing for Different Devices""; ""Fragments""; ""Architectural Design Patterns""
""Classic Android""""MVC""; ""The Model""; ""The View""; ""The Controller""; ""MVVM""; ""The Model""; ""The View""; ""The ViewModel""; ""Dependency Injection""; ""The ToDoModule""; ""The Database Provider""; ""The Stub Provider""; ""ToDoApplication""; ""Summary""; ""Chapter 3: Performance""; ""History""; ""Performance Tips""; ""Android Performance""; ""Java Performance""; ""SQLite Performance""; ""Web Services Performance""; ""Optimized Code""; ""Tools""; ""DDMS""; ""System Performance""; ""Heap Usage""; ""Eclipse Memory Analyzer""; ""Memory Allocation""; ""Threads""; ""Method Profiling"" ""Traceview""""Lint""; ""Hierarchy Viewer""; ""Unix Tools""; ""Top""; ""Dumpsys""; ""Vmstat""; ""Summary""; ""Chapter 4: Agile Android""; ""Benefits""; ""Benefits to the Business""; ""Benefits to the Developer""; ""The Sweet Spot""; ""Elements of Agile""; ""Goals""; ""Roll Call""; ""TDD""; ""BDD""; ""Continuous Integration""; ""Putting It All Together""; ""Summary""; ""Chapter 5: Native Development""; ""Deciding Where to Use Native Code""; ""Where Not to Use Native Code""; ""Where to Use Native Code""; ""Java Native Interface""; ""Difficulties Writing Native Code Using JNI"" ""Generate the Code Using a Tool""""Generating C/C++ Header Files Using javah""; ""Generating the JNI Code using SWIG""; ""Minimize the Number of JNI API Calls""; ""Use Primitive Data Types as Native Method Parameters""; ""Minimize Reach-Back from Native Code to Java Space""; ""Memory Usage""; ""Local References""; ""Never Cache Local References""; ""Release Local References in Complex Native Methods""; ""Dealing with Strings""; ""Use Proper Memory Management Function""; ""Operating on Arrays""; ""Do Not Request Unnecessary Array Elements""; ""Prevent Updating Unchanged Arrays"" ""Native I/O""""Caching Classes, Method and Field IDs""; ""Threading""; ""Never Cache the JNI Environment Interface Pointer""; ""Never Access Java Space from Detached Native Threads""; ""Troubleshooting""; ""Extended JNI Check""; ""Always Check for Java Exceptions""; ""Always Check JNI Return Values""; ""Always Add Log Lines While Developing""; ""Native Code Reuse Using Modules""; ""Benefit from Compiler Vectorization""; ""Summary""; ""Chapter 6: Security""; ""The State of Android Security""; ""Secure Coding Practices""; ""Industry Standard Lists""; ""PCI List""; ""OWASP"" ""OWASP�s General Secure Coding Guidelines"" |
Record Nr. | UNINA-9910300474903321 |
Nolan Godfrey | ||
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Android design patterns [[electronic resource] ] : interaction design solutions for developers / / Greg Nudelman |
Autore | Nudelman Greg |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley, 2013 |
Descrizione fisica | 1 online resource (458 p.) |
Disciplina |
005.25
005.258 |
Soggetto topico |
Application software - Development
Mobile computing Smartphones - Programming |
Soggetto genere / forma | Electronic books. |
ISBN |
1-118-41755-0
1-299-24192-1 1-118-43934-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. UX principles and Android OS considerations -- pt. 2. Android design patterns and antipatterns. |
Record Nr. | UNINA-9910465388503321 |
Nudelman Greg | ||
Indianapolis, Ind., : Wiley, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Android design patterns [[electronic resource] ] : interaction design solutions for developers / / Greg Nudelman |
Autore | Nudelman Greg |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley, 2013 |
Descrizione fisica | 1 online resource (458 p.) |
Disciplina |
005.25
005.258 |
Soggetto topico |
Application software - Development
Mobile computing Smartphones - Programming |
ISBN |
1-118-41755-0
1-299-24192-1 1-118-43934-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. UX principles and Android OS considerations -- pt. 2. Android design patterns and antipatterns. |
Record Nr. | UNINA-9910792080403321 |
Nudelman Greg | ||
Indianapolis, Ind., : Wiley, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Android design patterns : interaction design solutions for developers / / Greg Nudelman |
Autore | Nudelman Greg |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, Ind., : Wiley, 2013 |
Descrizione fisica | 1 online resource (458 p.) |
Disciplina |
005.25
005.258 |
Soggetto topico |
Application software - Development
Mobile computing Smartphones - Programming |
ISBN |
1-118-41755-0
1-299-24192-1 1-118-43934-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. 1. UX principles and Android OS considerations -- pt. 2. Android design patterns and antipatterns. |
Record Nr. | UNINA-9910812616203321 |
Nudelman Greg | ||
Indianapolis, Ind., : Wiley, 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Android security cookbook / / Keith Makan, Scott Alexander-Brown |
Autore | Makan Keith |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
Descrizione fisica | 1 online resource (350 p.) |
Disciplina | 005.258 |
Altri autori (Persone) | Alexander-BrownScott |
Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78216-717-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
Record Nr. | UNINA-9910453383103321 |
Makan Keith | ||
Birmingham : , : Packt Publishing, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Android security cookbook / / Keith Makan, Scott Alexander-Brown |
Autore | Makan Keith |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
Descrizione fisica | 1 online resource (350 p.) |
Disciplina | 005.258 |
Altri autori (Persone) | Alexander-BrownScott |
Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
ISBN | 1-78216-717-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
Record Nr. | UNINA-9910790736703321 |
Makan Keith | ||
Birmingham : , : Packt Publishing, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Android security cookbook / / Keith Makan, Scott Alexander-Brown |
Autore | Makan Keith |
Edizione | [1st edition] |
Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
Descrizione fisica | 1 online resource (350 p.) |
Disciplina | 005.258 |
Altri autori (Persone) | Alexander-BrownScott |
Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
ISBN | 1-78216-717-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
Record Nr. | UNINA-9910813033403321 |
Makan Keith | ||
Birmingham : , : Packt Publishing, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz |
Autore | Schwartz Marco |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing, , 2014 |
Descrizione fisica | 1 online resource (133 p.) |
Disciplina | 005.258 |
Collana | Community Experience Distilled |
Soggetto topico |
Arduino (Programmable controller)
Application software - Development Programmable controllers |
Soggetto genere / forma | Electronic books. |
ISBN | 1-78398-607-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Preface; Building Wireless XBee Motion Detectors; Hardware and software requirements; Hardware configuration; Interfacing the PIR sensor with Arduino; Programming an XBee motion detector; Building a graphical interface for your XBee motion detectors; Summary; Control Lights from Your Phone or Tablet; Hardware and software requirements; Hardware configuration; Test the relays and Wi-Fi connection; Building a graphical interface to control the relays; Testing the graphical interface; Summary; Measuring the Temperature Using Bluetooth; Hardware and software requirements; Hardware configuration
Creating the Arduino sketchTesting the temperature and humidity sensor; Measure the temperature and humidity remotely; Summary; Weather Station in the Cloud with Xively; Hardware and software requirements; Connecting the different components; Testing the sensors; Setting up your Xively account; Building the Arduino sketch; Log in and display data on Xively; Summary; Monitor Your Energy Consumption in the Cloud; Hardware and software requirements; Making hardware connections; Testing the project; Configuring your Xively account; Sending power consumption data to Xively; Summary Hack a Commercial Home Automation DeviceHardware and software requirements; Hardware configuration; Controlling the device from your computer; Building a graphical interface; Summary; Build Your Own Home Automation System; Hardware and software requirements; Building an Arduino system from scratch; Testing the Arduino system; Designing a PCB for your home automation system; Fabricating the board; Designing and 3D printing a case for your home automation project; Summary; Index |
Record Nr. | UNINA-9910458517903321 |
Schwartz Marco | ||
Birmingham, England : , : Packt Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz |
Autore | Schwartz Marco |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing, , 2014 |
Descrizione fisica | 1 online resource (133 p.) |
Disciplina | 005.258 |
Collana | Community Experience Distilled |
Soggetto topico |
Arduino (Programmable controller)
Application software - Development Programmable controllers |
ISBN | 1-78398-607-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Preface; Building Wireless XBee Motion Detectors; Hardware and software requirements; Hardware configuration; Interfacing the PIR sensor with Arduino; Programming an XBee motion detector; Building a graphical interface for your XBee motion detectors; Summary; Control Lights from Your Phone or Tablet; Hardware and software requirements; Hardware configuration; Test the relays and Wi-Fi connection; Building a graphical interface to control the relays; Testing the graphical interface; Summary; Measuring the Temperature Using Bluetooth; Hardware and software requirements; Hardware configuration
Creating the Arduino sketchTesting the temperature and humidity sensor; Measure the temperature and humidity remotely; Summary; Weather Station in the Cloud with Xively; Hardware and software requirements; Connecting the different components; Testing the sensors; Setting up your Xively account; Building the Arduino sketch; Log in and display data on Xively; Summary; Monitor Your Energy Consumption in the Cloud; Hardware and software requirements; Making hardware connections; Testing the project; Configuring your Xively account; Sending power consumption data to Xively; Summary Hack a Commercial Home Automation DeviceHardware and software requirements; Hardware configuration; Controlling the device from your computer; Building a graphical interface; Summary; Build Your Own Home Automation System; Hardware and software requirements; Building an Arduino system from scratch; Testing the Arduino system; Designing a PCB for your home automation system; Fabricating the board; Designing and 3D printing a case for your home automation project; Summary; Index |
Record Nr. | UNINA-9910791004503321 |
Schwartz Marco | ||
Birmingham, England : , : Packt Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz |
Autore | Schwartz Marco |
Pubbl/distr/stampa | Birmingham, England : , : Packt Publishing, , 2014 |
Descrizione fisica | 1 online resource (133 p.) |
Disciplina | 005.258 |
Collana | Community Experience Distilled |
Soggetto topico |
Arduino (Programmable controller)
Application software - Development Programmable controllers |
ISBN | 1-78398-607-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Preface; Building Wireless XBee Motion Detectors; Hardware and software requirements; Hardware configuration; Interfacing the PIR sensor with Arduino; Programming an XBee motion detector; Building a graphical interface for your XBee motion detectors; Summary; Control Lights from Your Phone or Tablet; Hardware and software requirements; Hardware configuration; Test the relays and Wi-Fi connection; Building a graphical interface to control the relays; Testing the graphical interface; Summary; Measuring the Temperature Using Bluetooth; Hardware and software requirements; Hardware configuration
Creating the Arduino sketchTesting the temperature and humidity sensor; Measure the temperature and humidity remotely; Summary; Weather Station in the Cloud with Xively; Hardware and software requirements; Connecting the different components; Testing the sensors; Setting up your Xively account; Building the Arduino sketch; Log in and display data on Xively; Summary; Monitor Your Energy Consumption in the Cloud; Hardware and software requirements; Making hardware connections; Testing the project; Configuring your Xively account; Sending power consumption data to Xively; Summary Hack a Commercial Home Automation DeviceHardware and software requirements; Hardware configuration; Controlling the device from your computer; Building a graphical interface; Summary; Build Your Own Home Automation System; Hardware and software requirements; Building an Arduino system from scratch; Testing the Arduino system; Designing a PCB for your home automation system; Fabricating the board; Designing and 3D printing a case for your home automation project; Summary; Index |
Record Nr. | UNINA-9910811047203321 |
Schwartz Marco | ||
Birmingham, England : , : Packt Publishing, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|