Android Apps Security

Overview

Android Apps Security provides guiding principles forhow to best design and develop Android apps with security in mind.It explores concepts that can be used to secure apps and howdevelopers can use and incorporate these security features into their apps.

This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as...

See more details below
Paperback (2012)
$31.02
BN.com price
(Save 31%)$44.99 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Paperback)
  • All (14) from $24.10   
  • New (12) from $26.24   
  • Used (2) from $24.10   
Android Apps Security

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$19.99
BN.com price
(Save 44%)$35.99 List Price

Overview

Android Apps Security provides guiding principles forhow to best design and develop Android apps with security in mind.It explores concepts that can be used to secure apps and howdevelopers can use and incorporate these security features into their apps.

This book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.

  • Overview of Android OS versions, features, architecture and security.
  • Detailed examination of areas where attacks on applications can take place and what controls should be implemented to protect private user data
  • In-depth guide to data encryption, authentication techniques, enterprise security and applied real-world examples of these concepts

What you’ll learn

  • How to identify data that should be secured
  • How to use the Android APIs to ensure confidentiality and integrity of data
  • How to build secure apps for the enterprise
  • About Public Key Infrastructure, encryption APIs and how to implement them in apps
  • About owners, access control lists and permissions to allow user control over App properties
  • Aboutclient-server apps and how to manage authentication, transport layer encryption and server-side security

Who this book is for

This book is for intermediate and experienced Android app developers that are already familiar with writing apps from scratch. It discusses mechanisms on how apps can be secured so that private, end-user data is kept secure on the device and while in transit. If you’re just embarking on the path to Android development, then this book may prove to be a useful companion to other developer guides.

Table of Contents

  1. Android Architecture & Security Controls
  2. The Foundation of an App
  3. Who Has Access?
  4. Designing and Developing 3 Sample Apps
  5. Using PKI & Encryption
  6. Interfacing with Web Services
  7. Writing for the Enterprise
  8. Designing and Developing 3 More Sample Apps
  9. Publishing and Selling Your Apps
  10. Malware, Spyware and Your End-User
  11. API Reference
Read More Show Less

Product Details

  • ISBN-13: 9781430240624
  • Publisher: Apress
  • Publication date: 9/12/2012
  • Edition description: 2012
  • Edition number: 1
  • Pages: 248
  • Sales rank: 967,423
  • Product dimensions: 7.50 (w) x 9.20 (h) x 0.50 (d)

Meet the Author

Sheran Gunasekera is a security researcher and software developer with more than 13 years of information security experience. He is director of research and development for ZenConsult Pte. Ltd., where he oversees security research in both the personal computer and mobile device platforms. Sheran has been very active in BlackBerry and Mobile Java security research and was the author of the whitepaper that revealed the inner workings of the first corporate-sanctioned malware application deployed to its subscribers by the UAE telecommunications operator Etisalat. He has spoken at many security conferences in the Middle East, Europe and Asia Pacific regions and also provides training on malware analysis for mobile devices and secure software development for both Web and mobile devices. He also writes articles and publishes research on his security-related blog, http://chirashi.zensay.com.
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)