Android Hacker's Handbook et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus


ou
Identifiez-vous pour activer la commande 1-Click.
ou
en essayant gratuitement Amazon Premium pendant 30 jours. Votre inscription aura lieu lors du passage de la commande. En savoir plus.
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 14,06
Amazon Rachète cet article
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Android Hacker's Handbook sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Android Hacker's Handbook [Anglais] [Broché]

Joshua J. Drake , Zach Lanier , Collin Mulliner , Pau Oliva Fora , Stephen A. Ridley , Georg Wicherski
4.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
Prix : EUR 30,22 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Il ne reste plus que 14 exemplaire(s) en stock (d'autres exemplaires sont en cours d'acheminement).
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le mardi 23 septembre ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 22,66  
Broché EUR 30,22  
Vendez cet article - Prix de rachat jusqu'à EUR 14,06
Vendez Android Hacker's Handbook contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 14,06, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Offres spéciales et liens associés


Produits fréquemment achetés ensemble

Android Hacker's Handbook + Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation + The Browser Hacker's Handbook
Acheter les articles sélectionnés ensemble


Descriptions du produit

Présentation de l'éditeur

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world′s foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker′s Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

Quatrième de couverture

A complete guide to securing the Android operating system The Android Hackers Handbook provides network security professionals and mobile device administrators with the specifics of the Android operating system from a security standpoint. This book explains how the operating system works, security risks associated with it, and the overall security architecture of the operating system. It also explains how vulnerabilities can be found in, and exploits developed for, various components of the system. Written by some of the worlds foremost Android security researchers, the Android Hackers Handbook is the only resource of its kind to explore Android security on this level. This essential guide includes both implementation details as well as complexities introduced by the open nature of the OS. Learn to: Become familiar with security implementation details, as well as complexities introduced by the open nature of the Android OS Avoid common security pitfalls and stay ahead of the latest smartphone hacking strategies Review the various types of attacks that have been successful against the Android OS Explore rooting and gain an understanding of the partition layout, boot process Understand the complex nature of the Android ecosystem, including the impact of various hardware vendors and software developers

Détails sur le produit

  • Broché: 576 pages
  • Editeur : John Wiley & Sons (18 avril 2014)
  • Langue : Anglais
  • ISBN-10: 111860864X
  • ISBN-13: 978-1118608647
  • Dimensions du produit: 23,4 x 18,5 x 3 cm
  • Moyenne des commentaires client : 4.0 étoiles sur 5  Voir tous les commentaires (1 commentaire client)
  • Classement des meilleures ventes d'Amazon: 12.859 en Livres anglais et étrangers (Voir les 100 premiers en Livres anglais et étrangers)
  • Table des matières complète
  •  Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Dans ce livre (En savoir plus)
Parcourir les pages échantillon
Couverture | Copyright | Table des matières | Extrait | Index | Quatrième de couverture
Rechercher dans ce livre:

Quels sont les autres articles que les clients achètent après avoir regardé cet article?


Commentaires en ligne 

5 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
4.0 étoiles sur 5
4.0 étoiles sur 5
Commentaires client les plus utiles
4.0 étoiles sur 5 Super mais en anglais 13 juin 2014
Par Fabrice TOP 1000 COMMENTATEURS
Format:Broché|Achat vérifié
Un super ouvrage pour les utilisateurs de produits utilisant Android (smartphones, tablettes etc.)

Pour les anglophones. Un livre assez pointu pour les non connaisseurs des systèmes et de la programmation sous Unix/Linux et Java, mais accessible à tout curieux de ce monde ouvert et/ou à tout curieux de ce que fait son portable android, et comment mieux le gérer.

A conseiller à tout curieux (anglophone) de ce qu'est une machine Android et comment l'atteindre au cœur.

Ouvrage récent ( couvrant jusqu'à Android 4.4.2 )
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.6 étoiles sur 5  11 commentaires
9 internautes sur 9 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Amazing book put together by the experts 15 avril 2014
Par Aditya Gupta - Publié sur Amazon.com
Format:Broché|Achat vérifié
Just finished reading the book - "Android Hackers Handbook". Truth be told, you can't find any other book which covers Android security and exploitation in such a detailed approach like this one.

After reading through each chapter, you'll feel like you've gained a huge knowledge base, which you could immediately apply in real-life scenario. I personally liked 4 chapters out of the total 13 the most - Debugging and Analysing Vulnerabilities (Chap7), User Space (Chap 8) Exploitation, ROP(Chap9) and Attacking RIL (Chap 11) .

Almost all of the concepts are explained along with the real code sample, which will help you when you try it out on your device. A perfect 5 for this book coming from the experts in Android Security.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Comprehensive guide to Android security (and how to breach it!) 16 août 2014
Par Steve Benner - Publié sur Amazon.com
Format:Broché
The "Android Hacker's Handbook" is a comprehensive guide to the Android operating system and its vulnerabilities, aimed at seasoned network security experts and mobile device specialists. In preparing the text, Wiley have drawn together a raft of expert technical authors: Joshua Drake, Director of Research Science, Accuvant Labs; Pau Oliva Fora, Mobile Security Engineer with viaForensics; Zach Lanier, Senior Security Researcher at Duo Security; Collin Mulliner, postdoc researcher at Northeastern University; Stephen A. Ridley, Principal Researcher with Xipiter; and Georg Wicherski, Senior Security Researcher with CrowdStrike. They have also done an excellent editing job, ensuring that the seams between the variously authored sections are invisible, with perfect continuity of style and clarity of presentation.

The book is highly technical but progresses logically and systematically from the opening chapter's consideration of the Android ecosystem with particular emphasis on the security implications arising from implementation fragmentation and compatibility issues, through specific features of Android design and functionality and the vulnerabilities arising therefrom, and finally wrapping everything up with an exposition of the possibilities arising from direct access to Android devices' hardware components to further research device vulnerabilities. Along the way, individual chapters concentrate on subjects which include:

* Android security deign and architecture, including a look at its various logical layers
* rooting the device, including an overview of root exploits that have been used in the past
* application security issues including an overview of the common security issues affecting Android apps, with worked case studies which show how to identify security-pertinent components and then exploit them to compromise data security
* Android's overall attack surface, looking at all of the ways that Android devices can be attacked and how to identify exposed endpoints on an Android device
* fuzz testing, providing an introduction to fuzzing and moving to an exploration of high level process fuzzing including identifying targets, creating and processing test inputs, together with a full explanation of the challenges involved and the benefits that can be gained
* analysing vulnerabilities, showing how to find the root cause of these and judging their exploitability
* exploiting user space, including an exploration of how to develop an exploit that utilises user space memory corruption
* exploring the potential of return oriented programming for achieving arbitrary native code operation
* mounting kernel attacks by exploiting the monolithic design, distribution model, configuration and consequential vast exposed attack surface that the kernel presents
* an explanation of Android's radio interface layer, providing an understanding of the Android telephony stack, which allows monitoring of the communications between that layer and the manufacturer's modem which interfaces Android to cellular hardware
* an exposition of the various exploit mitigations which mark progress in the arms race between attacker and defender and providing a full summary of the various hardening measures that can be implemented.

The good thing about the book is that while each section flows naturally from the preceding one, each is also sufficiently complete and self-contained that the book can be dipped into and mined for information and assistance with specific topics without the need to work through all of the details of earlier chapters. The book is exemplary in the clarity of the writing as well as the comprehensiveness of the material it covers: those with the background knowledge necessary to understand the basic subject matter should find that they will learn a lot very quickly from this book.

As you have no doubt gathered by now, the book is not for the faint-hearted or for the novice reader. It assumes considerable knowledge of network systems security issues, as well as a sound working knowledge of Ubuntu and a familiarity with the Android Open Source Project. In places, it also expects a certain degree of comfort with assembly language programming. The book is very hands-on in its approach and consequently assumes the reader has ready access to an Android device (preferably from the Google Nexus family), an Ubuntu 12.04 development machine and copies of the Android Software Developers Kit and the Android Native Development Kit.

All in all, this book is an excellent tool in the on-going war against cyber exploits in the mobile domain and should be on the required reading list of all mobile security professionals, as well as each and every Android application developer. You can be pretty sure the bad guys will be queuing up to get their hands on it and will be devouring every piece of information within it!
3 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Excellent Book! 28 avril 2014
Par Prime - Publié sur Amazon.com
Format:Broché|Achat vérifié
After reading the first chapter, you get a clear understanding of Android's origins and how the whole ecosystem works. The authors do an incredible job explaining things from start to finish. Chapter 3 on rooting devices also looks full of goodies. Great for plane and leisure reading, as well as to learn the fundamentals of Android security. Recommended for sure!
4.0 étoiles sur 5 Buy it!! very good and informative. 11 juillet 2014
Par Amazon Customer - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
Very thorough and informative book. I am fairly experienced in android and I still found this book valuable. I can see where this book would be useful to the entire spectrum of readers from novice to advanced. A must have in any hackers briefcase.
5.0 étoiles sur 5 Book that focuses on a single platform with deserved depth 28 juin 2014
Par Oko - Publié sur Amazon.com
Format:Broché|Achat vérifié
I have not finished the book and honestly I am not even close, but I wanted to give a review anyway because the technical depth of the book is amazing. This is not like some of the other books which provides content from web and other sources. This is original material and serious read. I am hoping to extend this review when I make progress to completion.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?