Book description
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, K
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface
- Acknowledgments
- Authors
- Conventions
- Chapter 1: Introduction to the Android Operating System and Threats (1/2)
- Chapter 1: Introduction to the Android Operating System and Threats (2/2)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (1/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (2/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (3/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (4/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (5/6)
- Chapter 2: Malware Threats, Hoaxes, and Taxonomy (6/6)
- Chapter 3: Open Source Tools (1/4)
- Chapter 3: Open Source Tools (2/4)
- Chapter 3: Open Source Tools (3/4)
- Chapter 3: Open Source Tools (4/4)
- Chapter 4: Static Analysis (1/4)
- Chapter 4: Static Analysis (2/4)
- Chapter 4: Static Analysis (3/4)
- Chapter 4: Static Analysis (4/4)
- Chapter 5: Android Malware Evolution (1/2)
- Chapter 5: Android Malware Evolution (2/2)
- Chapter 6: Android Malware Trends and Reversing Tactics (1/3)
- Chapter 6: Android Malware Trends and Reversing Tactics (2/3)
- Chapter 6: Android Malware Trends and Reversing Tactics (3/3)
- Chapter 7: Behavioral Analysis (1/8)
- Chapter 7: Behavioral Analysis (2/8)
- Chapter 7: Behavioral Analysis (3/8)
- Chapter 7: Behavioral Analysis (4/8)
- Chapter 7: Behavioral Analysis (5/8)
- Chapter 7: Behavioral Analysis (6/8)
- Chapter 7: Behavioral Analysis (7/8)
- Chapter 7: Behavioral Analysis (8/8)
- Chapter 8: Building Your Own Sandbox (1/10)
- Chapter 8: Building Your Own Sandbox (2/10)
- Chapter 8: Building Your Own Sandbox (3/10)
- Chapter 8: Building Your Own Sandbox (4/10)
- Chapter 8: Building Your Own Sandbox (5/10)
- Chapter 8: Building Your Own Sandbox (6/10)
- Chapter 8: Building Your Own Sandbox (7/10)
- Chapter 8: Building Your Own Sandbox (8/10)
- Chapter 8: Building Your Own Sandbox (9/10)
- Chapter 8: Building Your Own Sandbox (10/10)
- Chapter 9: Case Study Examples (1/6)
- Chapter 9: Case Study Examples (2/6)
- Chapter 9: Case Study Examples (3/6)
- Chapter 9: Case Study Examples (4/6)
- Chapter 9: Case Study Examples (5/6)
- Chapter 9: Case Study Examples (6/6)
- Bibliography
- Back Cover
Product information
- Title: Android Malware and Analysis
- Author(s):
- Release date: October 2014
- Publisher(s): Auerbach Publications
- ISBN: 9781482252200
You might also like
book
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to …
book
Web Security for Developers
The world has changed. Today, every time you make a site live, you’re opening it up …
book
Amazon Web Services in Action, Third Edition
Master essential best practices for deploying and managing applications on Amazon Web Services. This revised bestseller …
book
Penetration Testing
In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important …