Android hacker's handbook (Record no. 25289)

000 -LEADER
fixed length control field 02866nam a22004695i 4500
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131226s2014 inu 000 0 eng
LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2013958298
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118608647
INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111860864X (pbk. : alk. paper)
CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Description conventions rda
Transcribing agency DLC
AUTHENTICATION CODE
Authentication code pcc
SYSTEM CONTROL NUMBER
System control number 17984394
DATE AND TIME OF LATEST TRANSACTION
control field 20170126100614.0
CONTROL NUMBER
control field 59097
CONTROL NUMBER IDENTIFIER
control field UOWD
MAIN ENTRY--PERSONAL NAME
Personal name Drake, Joshua J.
TITLE STATEMENT
Title Android hacker's handbook
Statement of responsibility, etc Joshua J Drake...[et al.]
PROJECTED PUBLICATION DATE
Projected publication date 1404
PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer John Wiley & Sons,
Date of production, publication, distribution, manufacture c2014.
PHYSICAL DESCRIPTION
Extent xxix, 545 p. :
Other physical details ill. ;
Dimensions 24 cm.
CONTENT TYPE
Content Type Term text
Source rdacontent
MEDIA TYPE
Media Type Term unmediated
Source rdamedia
CARRIER TYPE
Carrier Type Term volume
Source rdacarrier
SUMMARY, ETC.
Summary, etc The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
GENERAL NOTE
General note Includes references and index.
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Android (Electronic resource)
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Application software
General subdivision Development
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Mobile computing
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hackers
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Smartphones
General subdivision Security measures
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer hackers
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Programming
-- Open Source
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Software Development & Engineering
-- Tools
Source of heading or term sears
SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Software Development & Engineering
-- General
Source of heading or term sears
ADDED ENTRY--PERSONAL NAME
Personal name Lanier, Zach
ADDED ENTRY--PERSONAL NAME
Personal name Fora, Pau Oliva
ADDED ENTRY--PERSONAL NAME
Personal name Mulliner, Collin
ADDED ENTRY--PERSONAL NAME
Personal name Ridley, Stephen A.
ADDED ENTRY--PERSONAL NAME
Personal name Wicherski, Georg
ADDED ENTRY ELEMENTS (KOHA)
Koha item type REGULAR
Holdings
Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Date checked out Cost, replacement price Price effective from Koha item type
        University of Wollongong in Dubai University of Wollongong in Dubai MAIN 2014-11-13 University Bookshop Sharjah 3 005.276 DR AN T0015088 2022-04-03 2022-04-03 200.00 2017-01-26 REGULAR

Powered by Koha