- Android Security Cookbook
- Keith Makan Scott Alexander Bown
- 229字
- 2021-07-21 17:52:58
Introduction
A very clever person once said that, "you should keep your friends close but your enemies closer". Being a security professional means keeping an eye on what developers are doing, have done, and are likely to do. This is because the decisions they make greatly affect the security landscape; after all, if no one wrote bad software, no one would exploit it!
Given that this book is aimed at anyone interested in analyzing, hacking, or developing the Android platform, the know thy enemy concept applies to you too! Android developers need to stay somewhat up to date with what Android hackers are up to if they hope to catch security vulnerabilities before they negatively affect the users. Conversely, Android hackers need to stay up to date with what Android developers are doing.
The upcoming chapters will walk you through getting the latest and greatest development and hacking tools and will get you to interact directly with the Android security architecture, both by breaking applications and securing them.
This chapter focuses on getting the Android Development Tools (ADT) up and running and discusses how to troubleshoot an installation and keep them up to date. If you feel you are already well-acquainted with the Android development environment and tool chains, feel free to skip this chapter.
Without further ado, let's talk about grabbing and installing the latest Android Development Tools.
- Node Security
- Web漏洞分析與防范實戰:卷1
- Kali Linux CTF Blueprints
- Learning Python for Forensics
- 網絡空間攻防技術原理
- 安全技術運營:方法與實踐
- API攻防:Web API安全指南
- 網絡安全能力成熟度模型:原理與實踐
- 安全防御入門手冊
- End to End GUI Development with Qt5
- INSTANT Apple Configurator How-to
- Learning Pentesting for Android Devices
- Kali Linux高級滲透測試(原書第4版)
- 網絡空間安全法律問題研究
- 計算機系統與網絡安全研究