Muutke küpsiste eelistusi

E-raamat: Bulletproof Android: Practical Advice for Building Secure Apps

  • Formaat: 240 pages
  • Sari: Developer's Library
  • Ilmumisaeg: 18-Nov-2014
  • Kirjastus: Addison Wesley
  • Keel: eng
  • ISBN-13: 9780133995084
  • Formaat - EPUB+DRM
  • Hind: 18,71 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 240 pages
  • Sari: Developer's Library
  • Ilmumisaeg: 18-Nov-2014
  • Kirjastus: Addison Wesley
  • Keel: eng
  • ISBN-13: 9780133995084

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Battle-Tested Best Practices for Securing Android Apps throughout the Development Lifecycle

Android’s immense popularity has made it today’s #1 target for attack: high-profile victims include eHarmony, Facebook, and Delta Airlines, just to name a few. Today, every Android app needs to resist aggressive attacks and protect data, and in Bulletproof Android™, Godfrey Nolan shows you how.

Unlike “black hat/gray hat” books, which focus on breaking code, this guide brings together complete best practices for hardening code throughout the entire development lifecycle. Using detailed examples from hundreds of apps he has personally audited, Nolan identifies common “anti-patterns” that expose apps to attack, and then demonstrates more secure solutions.

Nolan covers authentication, networking, databases, server attacks, libraries, hardware, and more. He illuminates each technique with code examples, offering expert advice on implementation and trade-offs. Each topic is supported with a complete sample app, which demonstrates real security problems and solutions.

Learn how to

  • Apply core practices for securing the platform
  • Protect code, algorithms, and business rules from reverse engineering
  • Eliminate hardcoding of keys, APIs, and other static data
  • Eradicate extraneous data from production APKs
  • Overcome the unique challenges of mobile authentication and login
  • Transmit information securely using SSL
  • Prevent man-in-the-middle attacks
  • Safely store data in SQLite databases
  • Prevent attacks against web servers and services
  • Avoid side-channel data leakage through third-party libraries
  • Secure APKs running on diverse devices and Android versions
  • Achieve HIPAA or FIPS compliance
  • Harden devices with encryption, SELinux, Knox, and MDM
  • Preview emerging attacks and countermeasures

This guide is a perfect complement to Nolan’s Android™ Security Essentials LiveLessons(video training; ISBN-13: 978-0-13-382904-4) and reflects new risks that have been identified since the LiveLessons were released.

Preface xill
Acknowledgments xxi
About the Author xxiii
1 Android Security Issues 1(18)
Why Android?
1(6)
Decompiling an APK
4(3)
Art for Art's Sake
7(1)
Guidelines
7(10)
PCI Mobile Payment Acceptance Security Guidelines
7(2)
Google Security
9(1)
HIPAA Secure
10(1)
OWASP Top
10(4)
Mobile Risks (2014)
14
Forrester Research's Top
10(6)
Nontechnical Security Issues in Mobile App Development
16(1)
Securing the Device
17(1)
SEAndroid
17(1)
Federal Information Processing Standard (FIPS)
18(1)
Conclusion
18(1)
2 Protecting Your Code 19(32)
Looking into the classes.dex File
19(5)
Obfuscation Best Practices
24(15)
No Obfuscation
26(1)
ProGuard
27(5)
DexGuard
32(6)
Security Through Obscurity
38(1)
Testing
38(1)
Smali
39(9)
Helloworld
39(4)
Remove App Store Check
43(5)
Hiding Business Rules in the NDK
48(1)
Conclusion
49(2)
3 Authentication 51(36)
Secure Logins
51(3)
Understanding Best Practices for User Authentication and Account Validation
54(11)
Take 1
55(1)
Take 2
56(3)
Take 3
59(3)
Take 4
62(3)
Application Licensing with LVL
65(12)
OAuth
77(7)
OAuth with Facebook
78(4)
Web and Mobile Session Management
82(2)
Vulnerability
84(1)
User Behavior
84(2)
Two (or More) Factor Authentication
85(1)
Conclusion
86(1)
4 Network Communication 87(22)
HTTP(S) Connection
88(4)
Symmetric Keys
92(2)
Asymmetric Keys
94(5)
Ineffective SSL
99(8)
Man-in-the-Middle Demo
100(2)
Root Your Phone
102(1)
Charles Proxy Test
103(4)
Conclusion
107(2)
5 Android Databases 109(22)
Android Database Security Issues
109(1)
SQLite
110(6)
Backing Up the Database Using adb
111(4)
Disabling Backup
115(1)
SQLCipher
116(4)
Finding the Key
119(1)
Hiding the Key
120(7)
Ask Each Time
120(2)
Shared Preferences
122(1)
In the Code
123(1)
In the NDK
124(3)
Web Services
127(1)
SQL Injection
127(2)
Conclusion
129(2)
6 Web Server Attacks 131(20)
Web Services
131(4)
OWASP Web Services Cheat Sheet
133(2)
Replay Attacks
135(1)
Cross Platform
135(5)
WebView Attacks
140(6)
SQL Injection
142(3)
XSS
145(1)
Cloud
146(4)
OWASP Web Top 10 Risks
146(2)
OWASP Cloud Top 10 Risks
148(1)
HIPAA Web Server Compliance
149(1)
Conclusion
150(1)
7 Third-Party Library Integration 151(16)
Transferring the Risk
152(1)
Permissions
152(2)
Installing Third-Party Apps
154(6)
Installing Crittercism
154(3)
Installing Crashlytics
157(3)
Trust but Verify
160(5)
Decompiling SDKs
160(3)
Man in the Middle
163(2)
Conclusion
165(2)
8 Device Security 167(12)
Wiping Your Device
168(1)
Fragmentation
168(4)
adb Backup
169(1)
Logs
169(3)
Device Encryption
172(2)
SEAndroid
174(2)
FIPS 140-2
176(1)
Mobile Device Management
177(1)
Conclusion
178(1)
9 The Future 179(16)
More Sophisticated Attacks
179(7)
Internet of Things
186(2)
Android Wearables
186(1)
Ford Sync AppID
187(1)
Audits and Compliance
188(2)
Tools
190(4)
Drozer
191(2)
OWASP Mobile Top 10 Risks
193(1)
Lint
193(1)
Conclusion
194(1)
Index 195
Godfrey Nolan is the founder and president of the mobile and web development company RIIS LLC based in Troy, Michigan, and Belfast, Northern Ireland. This is his fourth book. He has had a healthy obsession with reverse engineering bytecode since he wrote "Decompile Once, Run Anywhere," which first appeared in Web Techniques magazine way back in September 1997. Godfrey is originally from Dublin, Ireland.