O'Reilly logo

Android UI Design by Jessica Thornsby

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Best Practices and Securing Your Application

The Android operating system was designed in anticipation of hackers attempting to perform common attacks, such as social engineering attacks that try to trick the user into handing over their personal information or installing malware.

Android comes with built-in security features that significantly reduce the chances of security exploits succeeding, and that limit the impact of any attacks that do succeed.

These built-in security controls provide you, your application, and your users with a certain level of protection by default. Nevertheless, following security best practices is essential for further reducing the chances of your app leaving users vulnerable to exploits, data leaks, and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required