Android hacker’s handbook

dc.contributor.authorDrake, Joshua J.
dc.contributor.authorFora, Pau Oliva
dc.contributor.authorLanier, Zach
dc.contributor.authorMulliner, Collin
dc.contributor.authorRidley, Stephen A
dc.contributor.authorWicherski, Georg
dc.date.accessioned2018-10-29T07:21:22Z
dc.date.available2018-10-29T07:21:22Z
dc.date.copyright2014
dc.date.issued2014
dc.description1.Looking at the Ecosystem; 2. Android Security Design and Architecture; 3. Rooting Your Device; 4. Reviewing Application Security; 5. Understanding Android’s Attack Surface; 6. Finding Vulnerabilities with Fuzz Testing; 7. Debugging and Analyzing Vulnerabilities; 8. Exploiting User Space Software; 9. Return Oriented Programming; 10. Hacking and Attacking the Kernel...en_US
dc.description.sponsorshipUganda Institute of Information and Communications Technologyen_US
dc.identifier.citationDrake, J. J., Lanier, Z., Mulliner, C., Fora, P. O., Ridley, S. A., & Wicherski, G. (2014). Android hacker's handbook. John Wiley & Sons.en_US
dc.identifier.isbn978-1-118-60861-6
dc.identifier.urihttp://196.43.179.3:8080/xmlui/handle/123456789/647
dc.language.isoen_USen_US
dc.publisherJohn Wiley & Sons, Incen_US
dc.titleAndroid hacker’s handbooken_US
dc.typeBooken_US
dcterms.accessRightsUganda Institute of Information and Communications Technology has provided access to this e-book for educational and research purposes only. UICT does not authorize any use or reproduction whatsoever for commercial purposes. The e-book is displayed "as is" and without warranties of any kind, either express or implied, including any warranties of title, non-infringement of copyright or other rights. UICT E-Library collections may be protected by copyright law. Materials that are protected by copyright law may be used only with permission from the copyright owner, or within the limits of fair use and other statutory exceptions. UICT Library staff can provide legal advice. This e-book presented is not owned by UICT E-Library. Unless otherwise indicated, all permissions to publish from these materials must be directed to the publisher that is responsible for the publication of each e-book or PDF Drive. When practical, UICT imposes a Creative Commons Attribution Non-Commercial License (CC BY-NC) on materials in the UICT E-Library. If you have questions about publishing or reproducing materials from the UICT E-Library; or if you claim copyright ownership of this e-book in the UICT E-Library collections, and believe that your materials are inappropriately accessible on this portal, please contact: Ms. Nambobi Olivia, Librarian UICT Library +256(0)773-218-639/ +256(0)758-525-732 onambobi@uict.ac.ug, onambobi@gmail.com
dcterms.publisherJohn Wiley & Sons, Inc., Indianapolis, Indiana.
dcterms.tableOfContents1.Looking at the Ecosystem; 2. Android Security Design and Architecture; 3. Rooting Your Device; 4. Reviewing Application Security; 5. Understanding Android’s Attack Surface; 6. Finding Vulnerabilities with Fuzz Testing; 7. Debugging and Analyzing Vulnerabilities; 8. Exploiting User Space Software; 9. Return Oriented Programming; 10. Hacking and Attacking the Kernel...

Files