local_shipping Spend over €10 for free home delivery  place2 Hour Click & Collect Service Now Available

Android security internals

by Nikolay Elenkov | 07 November 2014
Synopsis
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sysètem. Elenkov describes Android security archiètecture from the bottom up, delving into the impleèmentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. You ll learn: How Android permissions are declared, used, and enforced How Android manages application packages and employs code signing to verify their authenticity How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks About Android s credential storage system and APIs, which let applications store cryptographic ke
€55.99
167 Reward Points
In stock online
Delivery 5-7 Days
Eligible for free delivery

Any purchases for more than €10 are eligible for free delivery anywhere in the UK or Ireland!

Synopsis
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sysètem. Elenkov describes Android security archiètecture from the bottom up, delving into the impleèmentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. You ll learn: How Android permissions are declared, used, and enforced How Android manages application packages and employs code signing to verify their authenticity How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks About Android s credential storage system and APIs, which let applications store cryptographic ke
Quantity
Quantity
€55.99
167 Reward Points
In stock online
Delivery 5-7 Days
Eligible for free delivery

Any purchases for more than €10 are eligible for free delivery anywhere in the UK or Ireland!

Quantity
Quantity

Product Details

ISBN - 9781593275815
Format -
Publisher -
Published - 07/11/2014
Categories - All, Books, Business Computers, Computers, General IT, All, Books, Business Computers, Computers, Computer Programming
No. of Pages - 432
Weight - 826
Edition -
Series - - Not Available
Page Size - 24
Language - en-US
Readership Age - Not Available
Table of Contents - Not Available

Delivery And Returns

Please Note: Items in our extended range may take longer to deliver. Delivery in 5-7 Days

Place an order for over €10 to receive free delivery to anywhere in Ireland and the UK! See our Delivery Charges section below for a full breakdown of shipping costs for all destinations.

Delivery Charges

  Ireland & UK* Europe & USA Australia & Canada Rest of World
Under €10 €3.80 €10 €15 €25
Over €10
Free €10 €15 €25

*Free delivery on all orders over €10 - only applies to order total.

All orders will be delivered by An Post.