官术网_书友最值得收藏!

Chapter 1. The Android Security Model – the Big Picture

Welcome to the first chapter of Android Application Security Essentials!

The Android stack is different in many ways. It is open; more advanced than some of the other platforms, and imbibes the learning from attempts to develop a mobile platform in the past. In this first chapter, we introduce the basics of the Android security model from the kernel all the way to the application level. Each security artifact introduced in this chapter is discussed in greater detail in the following chapters.

We kick off the chapter with explaining why install time application permission evaluation is integral to the security of the Android platform and user data. Android has a layered architecture and a security evaluation of each architectural layer is discussed in this chapter. We end the chapter with a discussion of core security artifacts such as application signing, secure data storage on the device, crypto APIs, and administration of an Android device.

主站蜘蛛池模板: 喀什市| 武定县| 万宁市| 蒲城县| 鹿泉市| 满洲里市| 双鸭山市| 五台县| 天水市| 临夏县| 噶尔县| 邻水| 上栗县| 姜堰市| 尖扎县| 通州市| 于田县| 大田县| 葵青区| 潍坊市| 报价| 仪陇县| 江阴市| 武清区| 偃师市| 类乌齐县| 柳林县| 新乡县| 安仁县| 乌鲁木齐县| 勃利县| 阳东县| 晋宁县| 互助| 呼玛县| 黑山县| 虎林市| 阳朔县| 萝北县| 安徽省| 厦门市|