Introduction. Android Architecture. Android Application Architecture. Android (in)Security. Pen Testing Android. Reverse Engineering Android Applications. Modifying the Behavior of Android Applications without Source Code. Hacking Android. Securing Android for the Enterprise Environment. Browser Security and Future Threat Landscape.
Anmol Misra is a contributing author of the
book Defending the Cloud: Waging War in Cyberspace (Infinity
Publishing, December 2011). His expertise includes mobile and
application security, vulnerability management, application and
infrastructure security assessments, and security code reviews.
He is currently Program Manager of the Critical Business Security
External (CBSE) team at Cisco. The CBSE team is part of the
Information Security Team (InfoSec) at Cisco and is responsible for
the security of Cisco’s Cloud Hosted Services. Prior to joining
Cisco, Anmol was a Senior Consultant with Ernst & Young LLP. In his
role, he advised Fortune 500 clients on defining and improving
Information Security programs and practices. He helped large
corporations to reduce IT security risk and achieve regulatory
compliance by improving their security posture.
Anmol holds a master’s degree in Information Networking from
Carnegie Mellon University. He also holds a Bachelor of Engineering
degree in Computer Engineering. He served as Vice President of
Alumni Relations for the Bay Area chapter of the Carnegie Mellon
Alumni Association.In his free time, Anmol enjoys long walks on the
beaches of San Francisco. He is a voracious reader of nonfiction
books—especially, history and economics—and is an aspiring
photographer.
Abhishek Dubey has a wide variety of experience in
information security, including reverse engineering, malware
analysis, and vulnerability detection. He is currently working as a
Lead/Senior Engineer of the Security Services and Cloud Operations
team at Cisco. Prior to joining Cisco, Abhishek was Senior
Researcher in the Advanced Threat Research Group at Webroot
Software.
Abhishek holds a master’s degree in Information Security and
Technology Management from Carnegie Mellon University and also
holds a B.Tech degree in Computer Science and Engineering. He is
currently pursuing studies in
... a must-have for security architects and consultants as well as enterprise security managers who are working with mobile devices and applications. -Dr. Dena Haritos Tsamitis, Director of the Information Networking Institute; and Director of Education, CyLab, Carnegie Mellon University If you are facing the complex challenge of securing data and applications for Android, this book provides valuable insight into the security architecture and practical guidance for safeguarding this modern platform. -Gerhard Eschelbeck, Chief Technology Officer and Senior Vice President, Sophos ... a great introduction to Android security, both from a platform and applications standpoint. ... provides the groundwork for anybody interested in mobile malware analysis ... a great starting point for anybody interested in cracking the nitty-gritty of most Android apps. -Nicholas Falliere, Founder of JEB Decompiler ... Dubey and Misra have filled a critical gap in software security literature by providing a unique and holistic approach to addressing this critical and often misunderstood topic. They have captured the essential threats and countermeasures that are necessary to understand and effectively implement secure Android-driven mobile environments. -James Ransome, Senior Director of Product Security, McAfee, An Intel Company Good book for Android security enthusiasts and developers that also covers advanced topics like reverse engineering of Android applications. A must have book for all security professionals. -Sanjay Kartkar, Cofounder of Quick Heal Technologies ... an excellent book for professional businesses that are trying to move their corporate applications on mobile/Android platforms. It helped me understand the threats foreseen in Android applications and how to protect against them. -Jagmeet Malhotra, Vice President of Markets & International Banking, Royal Bank of Scotland The book gives security professionals and executives a practical guide to the security implications and best practices for deploying Android platforms and applications in the (corporate) environment. -Steve Martino, VP Information Security, Cisco
![]() |
Ask a Question About this Product More... |
![]() |