Introduction. Android Architecture. Android Application Architecture. Android (in)Security. Pen Testing Android. Reverse Engineering Android Applications. Modifying the Behavior of Android Applications without Source Code. Hacking Android. Securing Android for the Enterprise Environment. Browser Security and Future Threat Landscape.
Anmol Misra is a contributing author of the
book Defending the Cloud: Waging War in Cyberspace (Infinity
Publishing, December 2011). His expertise includes mobile and
application security, vulnerability management, application and
infrastructure security assessments, and security code reviews.
He is currently Program Manager of the Critical Business Security
External (CBSE) team at Cisco. The CBSE team is part of the
Information Security Team (InfoSec) at Cisco and is responsible for
the security of Cisco’s Cloud Hosted Services. Prior to joining
Cisco, Anmol was a Senior Consultant with Ernst & Young LLP. In his
role, he advised Fortune 500 clients on defining and improving
Information Security programs and practices. He helped large
corporations to reduce IT security risk and achieve regulatory
compliance by improving their security posture.
Anmol holds a master’s degree in Information Networking from
Carnegie Mellon University. He also holds a Bachelor of Engineering
degree in Computer Engineering. He served as Vice President of
Alumni Relations for the Bay Area chapter of the Carnegie Mellon
Alumni Association.In his free time, Anmol enjoys long walks on the
beaches of San Francisco. He is a voracious reader of nonfiction
books—especially, history and economics—and is an aspiring
photographer.
Abhishek Dubey has a wide variety of experience in
information security, including reverse engineering, malware
analysis, and vulnerability detection. He is currently working as a
Lead/Senior Engineer of the Security Services and Cloud Operations
team at Cisco. Prior to joining Cisco, Abhishek was Senior
Researcher in the Advanced Threat Research Group at Webroot
Software.
Abhishek holds a master’s degree in Information Security and
Technology Management from Carnegie Mellon University and also
holds a B.Tech degree in Computer Science and Engineering. He is
currently pursuing studies in
... a must-have for security architects and consultants as well as
enterprise security managers who are working with mobile devices
and applications.
--Dr. Dena Haritos Tsamitis, Director of the Information Networking
Institute; and Director of Education, CyLab, Carnegie Mellon
University If you are facing the complex challenge of securing data
and applications for Android, this book provides valuable insight
into the security architecture and practical guidance for
safeguarding this modern platform.
--Gerhard Eschelbeck, Chief Technology Officer and Senior Vice
President, Sophos ... a great introduction to Android security,
both from a platform and applications standpoint. ... provides the
groundwork for anybody interested in mobile malware analysis ... a
great starting point for anybody interested in cracking the
nitty-gritty of most Android apps.
--Nicholas Falliere, Founder of JEB Decompiler ... Dubey and Misra
have filled a critical gap in software security literature by
providing a unique and holistic approach to addressing this
critical and often misunderstood topic. They have captured the
essential threats and countermeasures that are necessary to
understand and effectively implement secure Android-driven mobile
environments.
--James Ransome, Senior Director of Product Security, McAfee, An
Intel Company Good book for Android security enthusiasts and
developers that also covers advanced topics like reverse
engineering of Android applications. A must have book for all
security professionals.
--Sanjay Kartkar, Cofounder of Quick Heal Technologies ... an
excellent book for professional businesses that are trying to move
their corporate applications on mobile/Android platforms. It helped
me understand the threats foreseen in Android applications and how
to protect against them.
--Jagmeet Malhotra, Vice President of Markets & International
Banking, Royal Bank of Scotland The book gives security
professionals and executives a practical guide to the security
implications and best practices for deploying Android platforms and
applications in the (corporate) environment.
--Steve Martino, VP Information Security, Cisco
![]() |
Ask a Question About this Product More... |
![]() |