Android IOS 安全书籍

Android Hacker's Handbook

Author: Joshua J. Drake, Zach Lanier, Collin Mulliner, Pau Oliva, Stephen A. Ridley, Georg Wicherski

Year: 2013

Link: http://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X

Android Malware

Android Application Security Essentials

Hacking Exposed Mobile Security Secrets & Solutions

Android Security: Attacks and Defenses

Mobile Phone Security and Forensics: A Practical Approach

Android Apps Security

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

Application Security for the Android Platform: Processes, Permissions, and Other Safeguards

Decompiling Android

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

iOS Forensic Analysis: for iPhone, iPad and iPod Touch

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

Author: Andrew Hoog, Katie Strzempka

Year: 2011

Link: http://www.amazon.com/iPhone-iOS-Forensics-Investigation-Analysis/dp/1597496596/

iOS Hacker's Handbook

Author: Charlie Miller, Dion Blazakis, Dino DaiZovi, Stefan Esser, Vincenzo Iozzo, Ralf-Philipp Weinmann

Year: 2012

Link: http://www.amazon.com/iOS-Hackers-Handbook-Charlie-Miller/dp/1118204123/

Embedded Java Security: Security for Mobile Devices

Author: Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua

Year: 2010

Link: http://www.amazon.com/Embedded-Java-Security-Mobile-Devices/dp/1849966230/

Mobile Application Security

Author: Himanshu Dwivedi, Chris Clark and David Thiel

Year: 2012

Link: http://www.amazon.com/Mobile-Application-Security-Himanshu-Dwivedi/dp/0071633561/

XDA Developers' Android Hacker's Toolkit

Author: Jason Tyler, Will Verduzco

Year: 2012

Link: http://www.amazon.com/XDA-Developers-Android-Hackers-Toolkit/dp/1119951380/

Mobile Malware Attacks and Defense

iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets

Android Security 安全なアプリケーションを作成するために

Author: タオソフトウェア株式会社

Year: 2011

Link: http://www.amazon.co.jp/Android-Security-安全なアプリケーションを作成するために-タオソフトウェア株式会社/dp/4844331345/

Professional Cocoa Application Security

  • 0
    点赞
  • 3
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
Table of Contents Preface 1 Chapter 1: The Android Security Model – the Big Picture 7 Installing with care 7 Android platform architecture 9 Linux kernel 9 Middleware 11 Dalvik virtual machine 11 Application layer 11 Android application structure 12 Application signing 15 Data storage on the device 15 Crypto APIs 16 Device Administration 17 Summary 17 Chapter 2: Application Building Blocks 19 Application components 19 Activity 20 Activity declaration 20 Saving the Activity state 21 Saving user data 23 Service 23 Service declaration 24 Service modes 25 Lifecycle management 26 Binder 28 Content Provider 29 Provider declaration 30 Other security consideration 33 Table of Contents [ii ] Broadcast Receiver 34 Receiver declaration 35 Secure sending and receiving broadcasts 36 Local broadcasts 37 Intents 38 Explicit Intents 40 Implicit Intent 41 Intent Filter 42 Pending Intent 42 Summary 43 Chapter 3: Permissions 45 Permission protection levels 45 Application level permissions 53 Component level permissions 54 Activity 54 Service 54 Content Provider 55 Broadcast Receiver 56 Extending Android permissions 57 Adding a new permission 57 Creating a permission group 58 Creating a permission tree 59 Summary 60 Chapter 4: Defining the Application's Policy File 61 The AndroidManifest.xml file 61 Application policy use cases 66 Declaring application permissions 66 Declaring permissions for external applications 67 Applications running with the same Linux ID 68 External storage 70 Setting component visibility 72 Debugging 73 Backup 74 Putting it all together 74 Example checklist 75 Application level 76 Component level 77 Summary 78 Table of Contents [iii ] Chapter 5: Respect Your Users 79 Principles of data security 80 Confidentiality 80 Integrity 81 Availability 81 Identifying assets, threats, and attacks 81 What and where to store 86 End-to-end security 87 The mobile ecosystem 88 Three states of data 90 Digital rights management 92 Summary 95 Chapter 6: Your Tools – Crypto APIs 97 Terminology 98 Security providers 99 Random number generation 100 Hashing functions 101 Public key cryptography 103 RSA 104 Key generation 105 Encryption 105 Decryption 106 Padding 106 The Diffie-Hellman algorithm 106 Symmetric key cryptography 108 Stream cipher 109 Block cipher 110 Block cipher modes 111 Electronic Code Book (ECB) 111 Cipher Block Chaining (CBC) 112 Cipher Feedback Chaining (CFB) 113 Output Feedback Mode (OFB) 114 Advanced Encryption Standard (AES) 115 Message Authentication Codes 116 Summary 117 Chapter 7: Securing Application Data 119 Data storage decisions 120 Privacy 120 Data retention 121 Implementation decisions 121 Table of Contents [iv ] User preferences 123 Shared preferences 123 Creating a preference file 123 Writing preference 124 Reading preference 124 Preference Activity 125 File 125 Creating a file 126 Writing to a file 126 Reading from a file 126 File operations on an external storage 127 Cache 128 Database 129 Account manager 131 SSL/TLS 132 Installing an application on an external storage 133 Summary 136 Chapter 8: Android in the Enterprise 137 The basics 138 Understanding the Android ecosystem 138 Device administration capabilities 139 Device administration API 140 Policies 141 DeviceAdminReceiver 142 Protecting data on a device 145 Encryption 146 Backup 147 Secure connection 147 Identity 148 Next steps 149 Device specific decisions 149 Knowing your community 151 Defining boundaries 151 Android compatibility program 151 Rolling out support 152 Policy and compliance 153 FINRA 153 Android Update Alliance 154 Summary 154 Table of Contents [v ] Chapter 9: Testing for Security 155 Testing overview 156 Security testing basics 158 Security tenets 158 Security testing categories 160 Application review 160 Manual testing 161 Dynamic testing 161 Sample test case scenarios 161 Testing on the server 161 Testing the network 162 Securing data in transit 162 Secure storage 162 Validating before acting 162 The principle of least privilege 163 Managing liability 163 Cleaning up 164 Usability versus security 164 Authentication scheme 164 Thinking like a hacker 164 Integrating with caution 164 Security testing the resources 165 OWASP 165 Android utilities 165 Android Debug Bridge 165 Setting up the device 166 SQlite3 166 Dalvik Debug Monitor Service 167 BusyBox 167 Decompile APK 168 Summary 169 Chapter 10: Looking into the Future 171 Mobile commerce 172 Product discovery using a mobile device 172 Mobile payments 173 Configurations 173 PCI Standard 175 Point of Sale 176 Proximity technologies 178 Social networking 178 Table of Contents [vi ] Healthcare 180 Authentication 180 Two-factor authentication 180 Biometrics 181 Advances in hardware 182 Hardware security module 183 TrustZone 184 Mobile trusted module 185 Application architecture 185 Summary 186 Index 187

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值