top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Android Best Practices / / by Godfrey Nolan, David Truxall, Raghav Sood, Onur Cinar
Android Best Practices / / by Godfrey Nolan, David Truxall, Raghav Sood, Onur Cinar
Autore Nolan Godfrey
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014
Descrizione fisica 1 online resource (223 p.)
Disciplina 004
004.6
005.258
Soggetto topico Mobile computing
Special purpose computers
Mobile Computing
Special Purpose and Application-Based Systems
ISBN 1-4302-5858-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ""Contents at a Glance""; ""Contents""; ""About the Authors""; ""About the Technical Reviewers""; ""Chapter 1: Before You Start""; ""Introduction to Android""; ""Who Should Read This Book?""; ""What You Need Before You Begin""; ""An Actual Android Application""; ""A Working Development Environment""; ""All the Bells and Whistles""; ""Source Code for the Sample Application""; ""What�s in This Book""; ""Chapter 2: Android Patterns""; ""UI Design Patterns""; ""Holo""; ""ActionBarSherlock Navigation""; ""Designing for Different Devices""; ""Fragments""; ""Architectural Design Patterns""
""Classic Android""""MVC""; ""The Model""; ""The View""; ""The Controller""; ""MVVM""; ""The Model""; ""The View""; ""The ViewModel""; ""Dependency Injection""; ""The ToDoModule""; ""The Database Provider""; ""The Stub Provider""; ""ToDoApplication""; ""Summary""; ""Chapter 3: Performance""; ""History""; ""Performance Tips""; ""Android Performance""; ""Java Performance""; ""SQLite Performance""; ""Web Services Performance""; ""Optimized Code""; ""Tools""; ""DDMS""; ""System Performance""; ""Heap Usage""; ""Eclipse Memory Analyzer""; ""Memory Allocation""; ""Threads""; ""Method Profiling""
""Traceview""""Lint""; ""Hierarchy Viewer""; ""Unix Tools""; ""Top""; ""Dumpsys""; ""Vmstat""; ""Summary""; ""Chapter 4: Agile Android""; ""Benefits""; ""Benefits to the Business""; ""Benefits to the Developer""; ""The Sweet Spot""; ""Elements of Agile""; ""Goals""; ""Roll Call""; ""TDD""; ""BDD""; ""Continuous Integration""; ""Putting It All Together""; ""Summary""; ""Chapter 5: Native Development""; ""Deciding Where to Use Native Code""; ""Where Not to Use Native Code""; ""Where to Use Native Code""; ""Java Native Interface""; ""Difficulties Writing Native Code Using JNI""
""Generate the Code Using a Tool""""Generating C/C++ Header Files Using javah""; ""Generating the JNI Code using SWIG""; ""Minimize the Number of JNI API Calls""; ""Use Primitive Data Types as Native Method Parameters""; ""Minimize Reach-Back from Native Code to Java Space""; ""Memory Usage""; ""Local References""; ""Never Cache Local References""; ""Release Local References in Complex Native Methods""; ""Dealing with Strings""; ""Use Proper Memory Management Function""; ""Operating on Arrays""; ""Do Not Request Unnecessary Array Elements""; ""Prevent Updating Unchanged Arrays""
""Native I/O""""Caching Classes, Method and Field IDs""; ""Threading""; ""Never Cache the JNI Environment Interface Pointer""; ""Never Access Java Space from Detached Native Threads""; ""Troubleshooting""; ""Extended JNI Check""; ""Always Check for Java Exceptions""; ""Always Check JNI Return Values""; ""Always Add Log Lines While Developing""; ""Native Code Reuse Using Modules""; ""Benefit from Compiler Vectorization""; ""Summary""; ""Chapter 6: Security""; ""The State of Android Security""; ""Secure Coding Practices""; ""Industry Standard Lists""; ""PCI List""; ""OWASP""
""OWASP�s General Secure Coding Guidelines""
Record Nr. UNINA-9910300474903321
Nolan Godfrey  
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android design patterns [[electronic resource] ] : interaction design solutions for developers / / Greg Nudelman
Android design patterns [[electronic resource] ] : interaction design solutions for developers / / Greg Nudelman
Autore Nudelman Greg
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley, 2013
Descrizione fisica 1 online resource (458 p.)
Disciplina 005.25
005.258
Soggetto topico Application software - Development
Mobile computing
Smartphones - Programming
Soggetto genere / forma Electronic books.
ISBN 1-118-41755-0
1-299-24192-1
1-118-43934-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. UX principles and Android OS considerations -- pt. 2. Android design patterns and antipatterns.
Record Nr. UNINA-9910465388503321
Nudelman Greg  
Indianapolis, Ind., : Wiley, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android design patterns [[electronic resource] ] : interaction design solutions for developers / / Greg Nudelman
Android design patterns [[electronic resource] ] : interaction design solutions for developers / / Greg Nudelman
Autore Nudelman Greg
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley, 2013
Descrizione fisica 1 online resource (458 p.)
Disciplina 005.25
005.258
Soggetto topico Application software - Development
Mobile computing
Smartphones - Programming
ISBN 1-118-41755-0
1-299-24192-1
1-118-43934-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. UX principles and Android OS considerations -- pt. 2. Android design patterns and antipatterns.
Record Nr. UNINA-9910792080403321
Nudelman Greg  
Indianapolis, Ind., : Wiley, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android design patterns : interaction design solutions for developers / / Greg Nudelman
Android design patterns : interaction design solutions for developers / / Greg Nudelman
Autore Nudelman Greg
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, Ind., : Wiley, 2013
Descrizione fisica 1 online resource (458 p.)
Disciplina 005.25
005.258
Soggetto topico Application software - Development
Mobile computing
Smartphones - Programming
ISBN 1-118-41755-0
1-299-24192-1
1-118-43934-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. 1. UX principles and Android OS considerations -- pt. 2. Android design patterns and antipatterns.
Record Nr. UNINA-9910812616203321
Nudelman Greg  
Indianapolis, Ind., : Wiley, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android security cookbook / / Keith Makan, Scott Alexander-Brown
Android security cookbook / / Keith Makan, Scott Alexander-Brown
Autore Makan Keith
Edizione [1st edition]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (350 p.)
Disciplina 005.258
Altri autori (Persone) Alexander-BrownScott
Soggetto topico Operating systems (Computers) - Security measures
Smartphones - Security measures
Soggetto genere / forma Electronic books.
ISBN 1-78216-717-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers
Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications
Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode
Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction
Using cryptography libraries
Record Nr. UNINA-9910453383103321
Makan Keith  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android security cookbook / / Keith Makan, Scott Alexander-Brown
Android security cookbook / / Keith Makan, Scott Alexander-Brown
Autore Makan Keith
Edizione [1st edition]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (350 p.)
Disciplina 005.258
Altri autori (Persone) Alexander-BrownScott
Soggetto topico Operating systems (Computers) - Security measures
Smartphones - Security measures
ISBN 1-78216-717-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers
Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications
Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode
Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction
Using cryptography libraries
Record Nr. UNINA-9910790736703321
Makan Keith  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Android security cookbook / / Keith Makan, Scott Alexander-Brown
Android security cookbook / / Keith Makan, Scott Alexander-Brown
Autore Makan Keith
Edizione [1st edition]
Pubbl/distr/stampa Birmingham : , : Packt Publishing, , 2013
Descrizione fisica 1 online resource (350 p.)
Disciplina 005.258
Altri autori (Persone) Alexander-BrownScott
Soggetto topico Operating systems (Computers) - Security measures
Smartphones - Security measures
ISBN 1-78216-717-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers
Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications
Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode
Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction
Using cryptography libraries
Record Nr. UNINA-9910813033403321
Makan Keith  
Birmingham : , : Packt Publishing, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz
Autore Schwartz Marco
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (133 p.)
Disciplina 005.258
Collana Community Experience Distilled
Soggetto topico Arduino (Programmable controller)
Application software - Development
Programmable controllers
Soggetto genere / forma Electronic books.
ISBN 1-78398-607-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface; Building Wireless XBee Motion Detectors; Hardware and software requirements; Hardware configuration; Interfacing the PIR sensor with Arduino; Programming an XBee motion detector; Building a graphical interface for your XBee motion detectors; Summary; Control Lights from Your Phone or Tablet; Hardware and software requirements; Hardware configuration; Test the relays and Wi-Fi connection; Building a graphical interface to control the relays; Testing the graphical interface; Summary; Measuring the Temperature Using Bluetooth; Hardware and software requirements; Hardware configuration
Creating the Arduino sketchTesting the temperature and humidity sensor; Measure the temperature and humidity remotely; Summary; Weather Station in the Cloud with Xively; Hardware and software requirements; Connecting the different components; Testing the sensors; Setting up your Xively account; Building the Arduino sketch; Log in and display data on Xively; Summary; Monitor Your Energy Consumption in the Cloud; Hardware and software requirements; Making hardware connections; Testing the project; Configuring your Xively account; Sending power consumption data to Xively; Summary
Hack a Commercial Home Automation DeviceHardware and software requirements; Hardware configuration; Controlling the device from your computer; Building a graphical interface; Summary; Build Your Own Home Automation System; Hardware and software requirements; Building an Arduino system from scratch; Testing the Arduino system; Designing a PCB for your home automation system; Fabricating the board; Designing and 3D printing a case for your home automation project; Summary; Index
Record Nr. UNINA-9910458517903321
Schwartz Marco  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz
Autore Schwartz Marco
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (133 p.)
Disciplina 005.258
Collana Community Experience Distilled
Soggetto topico Arduino (Programmable controller)
Application software - Development
Programmable controllers
ISBN 1-78398-607-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface; Building Wireless XBee Motion Detectors; Hardware and software requirements; Hardware configuration; Interfacing the PIR sensor with Arduino; Programming an XBee motion detector; Building a graphical interface for your XBee motion detectors; Summary; Control Lights from Your Phone or Tablet; Hardware and software requirements; Hardware configuration; Test the relays and Wi-Fi connection; Building a graphical interface to control the relays; Testing the graphical interface; Summary; Measuring the Temperature Using Bluetooth; Hardware and software requirements; Hardware configuration
Creating the Arduino sketchTesting the temperature and humidity sensor; Measure the temperature and humidity remotely; Summary; Weather Station in the Cloud with Xively; Hardware and software requirements; Connecting the different components; Testing the sensors; Setting up your Xively account; Building the Arduino sketch; Log in and display data on Xively; Summary; Monitor Your Energy Consumption in the Cloud; Hardware and software requirements; Making hardware connections; Testing the project; Configuring your Xively account; Sending power consumption data to Xively; Summary
Hack a Commercial Home Automation DeviceHardware and software requirements; Hardware configuration; Controlling the device from your computer; Building a graphical interface; Summary; Build Your Own Home Automation System; Hardware and software requirements; Building an Arduino system from scratch; Testing the Arduino system; Designing a PCB for your home automation system; Fabricating the board; Designing and 3D printing a case for your home automation project; Summary; Index
Record Nr. UNINA-9910791004503321
Schwartz Marco  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz
Arduino home automation projects : automate your home using the powerful Arduino platform / / Marco Schwartz
Autore Schwartz Marco
Pubbl/distr/stampa Birmingham, England : , : Packt Publishing, , 2014
Descrizione fisica 1 online resource (133 p.)
Disciplina 005.258
Collana Community Experience Distilled
Soggetto topico Arduino (Programmable controller)
Application software - Development
Programmable controllers
ISBN 1-78398-607-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface; Building Wireless XBee Motion Detectors; Hardware and software requirements; Hardware configuration; Interfacing the PIR sensor with Arduino; Programming an XBee motion detector; Building a graphical interface for your XBee motion detectors; Summary; Control Lights from Your Phone or Tablet; Hardware and software requirements; Hardware configuration; Test the relays and Wi-Fi connection; Building a graphical interface to control the relays; Testing the graphical interface; Summary; Measuring the Temperature Using Bluetooth; Hardware and software requirements; Hardware configuration
Creating the Arduino sketchTesting the temperature and humidity sensor; Measure the temperature and humidity remotely; Summary; Weather Station in the Cloud with Xively; Hardware and software requirements; Connecting the different components; Testing the sensors; Setting up your Xively account; Building the Arduino sketch; Log in and display data on Xively; Summary; Monitor Your Energy Consumption in the Cloud; Hardware and software requirements; Making hardware connections; Testing the project; Configuring your Xively account; Sending power consumption data to Xively; Summary
Hack a Commercial Home Automation DeviceHardware and software requirements; Hardware configuration; Controlling the device from your computer; Building a graphical interface; Summary; Build Your Own Home Automation System; Hardware and software requirements; Building an Arduino system from scratch; Testing the Arduino system; Designing a PCB for your home automation system; Fabricating the board; Designing and 3D printing a case for your home automation project; Summary; Index
Record Nr. UNINA-9910811047203321
Schwartz Marco  
Birmingham, England : , : Packt Publishing, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui