Warehouse Stock Clearance Sale

Grab a bargain today!


Android Security
By

Rating

Product Description
Product Details

Table of Contents

Introduction. Android Architecture. Android Application Architecture. Android (in)Security. Pen Testing Android. Reverse Engineering Android Applications. Modifying the Behavior of Android Applications without Source Code. Hacking Android. Securing Android for the Enterprise Environment. Browser Security and Future Threat Landscape.

About the Author

Anmol Misra is a contributing author of the book Defending the Cloud: Waging War in Cyberspace (Infinity Publishing, December 2011). His expertise includes mobile and application security, vulnerability management, application and infrastructure security assessments, and security code reviews.

He is currently Program Manager of the Critical Business Security External (CBSE) team at Cisco. The CBSE team is part of the Information Security Team (InfoSec) at Cisco and is responsible for the security of Cisco’s Cloud Hosted Services. Prior to joining Cisco, Anmol was a Senior Consultant with Ernst & Young LLP. In his role, he advised Fortune 500 clients on defining and improving Information Security programs and practices. He helped large corporations to reduce IT security risk and achieve regulatory compliance by improving their security posture.

Anmol holds a master’s degree in Information Networking from Carnegie Mellon University. He also holds a Bachelor of Engineering degree in Computer Engineering. He served as Vice President of Alumni Relations for the Bay Area chapter of the Carnegie Mellon Alumni Association.In his free time, Anmol enjoys long walks on the beaches of San Francisco. He is a voracious reader of nonfiction books—especially, history and economics—and is an aspiring photographer.
Abhishek Dubey has a wide variety of experience in information security, including reverse engineering, malware analysis, and vulnerability detection. He is currently working as a Lead/Senior Engineer of the Security Services and Cloud Operations team at Cisco. Prior to joining Cisco, Abhishek was Senior Researcher in the Advanced Threat Research Group at Webroot Software.

Abhishek holds a master’s degree in Information Security and Technology Management from Carnegie Mellon University and also holds a B.Tech degree in Computer Science and Engineering. He is currently pursuing studies in

Reviews

... a must-have for security architects and consultants as well as enterprise security managers who are working with mobile devices and applications.
--Dr. Dena Haritos Tsamitis, Director of the Information Networking Institute; and Director of Education, CyLab, Carnegie Mellon University If you are facing the complex challenge of securing data and applications for Android, this book provides valuable insight into the security architecture and practical guidance for safeguarding this modern platform.
--Gerhard Eschelbeck, Chief Technology Officer and Senior Vice President, Sophos ... a great introduction to Android security, both from a platform and applications standpoint. ... provides the groundwork for anybody interested in mobile malware analysis ... a great starting point for anybody interested in cracking the nitty-gritty of most Android apps.
--Nicholas Falliere, Founder of JEB Decompiler ... Dubey and Misra have filled a critical gap in software security literature by providing a unique and holistic approach to addressing this critical and often misunderstood topic. They have captured the essential threats and countermeasures that are necessary to understand and effectively implement secure Android-driven mobile environments.
--James Ransome, Senior Director of Product Security, McAfee, An Intel Company Good book for Android security enthusiasts and developers that also covers advanced topics like reverse engineering of Android applications. A must have book for all security professionals.
--Sanjay Kartkar, Cofounder of Quick Heal Technologies ... an excellent book for professional businesses that are trying to move their corporate applications on mobile/Android platforms. It helped me understand the threats foreseen in Android applications and how to protect against them.
--Jagmeet Malhotra, Vice President of Markets & International Banking, Royal Bank of Scotland The book gives security professionals and executives a practical guide to the security implications and best practices for deploying Android platforms and applications in the (corporate) environment.
--Steve Martino, VP Information Security, Cisco

Ask a Question About this Product More...
 
Look for similar items by category
People also searched for
Item ships from and is sold by Fishpond Retail Limited.

Back to top
We use essential and some optional cookies to provide you the best shopping experience. Visit our cookies policy page for more information.