Description |
1 online resource (1 volume) : illustrations |
Contents |
1. Android's Security Model -- 2. Permissions -- 3. Package Management -- 4. User Management -- 5. Cryptographic Providers -- 6. Network Security and PKI -- 7. Credential Storage -- 8. Online Account Management -- 9. Enterprise Security -- 10. Device Security -- 11. NFC and Secure Elements -- 12. SELinux -- 13. System Updates and Root Access |
Summary |
This book describes Android security architecture, including the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. Coverage includes: how Android permissions are declared, used, and enforced; how Android manages application packages and employs code signing to verify their authenticity; how Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks; Android's credential storage system and APIs, which let applications store cryptographic keys securely; the online account management framework and how Google accounts integrate with Android; the implementation of verified boot, disk encryption, lockscreen, and other device security features; and how Android's bootloader and recovery OS are used to perform full system updates, and how to obtain root access. -- Edited summary from book |
Bibliography |
Includes bibliographical references and index |
Notes |
Online resource; title from title page (Safari, viewed November 18, 2014) |
SUBJECT |
Android (Electronic resource) -- Security measures
|
|
Android (Electronic resource) http://id.loc.gov/authorities/names/n2009043077
|
|
Android (Electronic resource) -- Programming
|
|
Android (Electronic resource) fast |
Subject |
Security systems
|
Form |
Electronic book
|
ISBN |
1593275811 |
|
9781593275815 |
|
9781593276416 |
|
1593276419 |
|