000 -LEADER |
fixed length control field |
02866nam a22004695i 4500 |
FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
131226s2014 inu 000 0 eng |
LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2013958298 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781118608647 |
INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
111860864X (pbk. : alk. paper) |
CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
AUTHENTICATION CODE |
Authentication code |
pcc |
SYSTEM CONTROL NUMBER |
System control number |
17984394 |
DATE AND TIME OF LATEST TRANSACTION |
control field |
20170126100614.0 |
CONTROL NUMBER |
control field |
59097 |
CONTROL NUMBER IDENTIFIER |
control field |
UOWD |
MAIN ENTRY--PERSONAL NAME |
Personal name |
Drake, Joshua J. |
TITLE STATEMENT |
Title |
Android hacker's handbook |
Statement of responsibility, etc |
Joshua J Drake...[et al.] |
PROJECTED PUBLICATION DATE |
Projected publication date |
1404 |
PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS |
Place of production, publication, distribution, manufacture |
Indianapolis, IN : |
Name of producer, publisher, distributor, manufacturer |
John Wiley & Sons, |
Date of production, publication, distribution, manufacture |
c2014. |
PHYSICAL DESCRIPTION |
Extent |
xxix, 545 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
CONTENT TYPE |
Content Type Term |
text |
Source |
rdacontent |
MEDIA TYPE |
Media Type Term |
unmediated |
Source |
rdamedia |
CARRIER TYPE |
Carrier Type Term |
volume |
Source |
rdacarrier |
SUMMARY, ETC. |
Summary, etc |
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security. |
GENERAL NOTE |
General note |
Includes references and index. |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Android (Electronic resource) |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Application software |
General subdivision |
Development |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Mobile computing |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Hackers |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Smartphones |
General subdivision |
Security measures |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer hackers |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS |
General subdivision |
Programming |
-- |
Open Source |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS |
General subdivision |
Software Development & Engineering |
-- |
Tools |
Source of heading or term |
sears |
SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
COMPUTERS |
General subdivision |
Software Development & Engineering |
-- |
General |
Source of heading or term |
sears |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Lanier, Zach |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Fora, Pau Oliva |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Mulliner, Collin |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Ridley, Stephen A. |
ADDED ENTRY--PERSONAL NAME |
Personal name |
Wicherski, Georg |
ADDED ENTRY ELEMENTS (KOHA) |
Koha item type |
REGULAR |