没有合适的资源?快使用搜索试试~ 我知道了~
首页Android Malware and Analysis (android恶意软件分析)
资源详情
资源评论
资源推荐
Information Technology / Security & Auditing
The rapid growth and development of Android-based devices has resulted in a
wealth of sensitive information on mobile devices that offer minimal malware
protection. This has created an immediate demand for security professionals
that understand how to best approach the subject of Android malware threats
and analysis.
In Android Malware and Analysis, Ken Dunham, renowned global malware
expert and author, teams up with international experts to document the best
tools and tactics available for analyzing Android malware. The book covers
both methods of malware analysis: dynamic and static.
This tactical and practical book shows you how to use to use dynamic malware
analysis to check the behavior of an application/malware as it has been executed
in the system. It also describes how you can apply static analysis to break apart
the application/malware using reverse engineering tools and techniques to
recreate the actual code and algorithms used.
The book presents the insights of experts in the eld, who have already sized up
the best tools, tactics, and procedures for recognizing and analyzing Android
malware threats quickly and effectively. You also get access to an online library
of tools that supplies what you will need to begin your own analysis of Android
malware threats. Tools available on the book’s site include updated information,
tutorials, code, scripts, and author assistance.
This is not a book on Android OS, fuzzy testing, or social engineering. Instead,
it is about the best ways to analyze and tear apart Android malware threats.
After reading the book, you will be able to immediately implement the tools and
tactics covered to identify and analyze the latest evolution of Android threats.
ISBN: 978-1-4822-5219-4
9 781482 252194
90000
6000 Broken Sound Parkway, NW
Suite 300, Boca Raton, FL 33487
711 Third Avenue
New York, NY 10017
2 Park Square, Milton Park
Abingdon, Oxon OX14 4RN, UK
an informa business
www.crcpress.com
ANDROID MALWARE
AND ANALYSIS
Ken Dunham • Shane Hartman
Jose Andre Morales
Manu Quintans • Tim Strazzere
ANDROID MALWARE AND ANALYSIS
Dunham • Hartman
Morales
Quintans • Strazzere
K23862
www.auerbach-publications.com
K23862 cvr mech.indd 1 9/18/14 1:23 PM
ANDROID MALWARE
AND ANALYSIS
OTHER INFORMATION SECURITY BOOKS FROM AUERBACH
Anonymous Communication Networks:
Protecting Privacy on the Web
Kun Peng
ISBN 978-1-4398-8157-6
Conducting Network Penetration and
Espionage in a Global Environment
Bruce Middleton
ISBN 978-1-4822-0647-0
Cyberspace and Cybersecurity
George Kostopoulos
ISBN 978-1-4665-0133-1
Developing and Securing the Cloud
Bhavani Thuraisingham
ISBN 978-1-4398-6291-9
Ethical Hacking and Penetration
Testing Guide
Rafay Baloch
ISBN 978-1-4822-3161-8
Guide to the De-Identication of
Personal Health Information
Khaled El Emam
ISBN 978-1-4665-7906-4
Industrial Espionage: Developing a
Counterespionage Program
Daniel J. Benny
ISBN 978-1-4665-6814-3
Information Security Fundamentals,
Second Edition
Thomas R. Peltier
ISBN 978-1-4398-1062-0
Information Security Policy Development for
Compliance: ISO/IEC 27001, NIST SP 800-53,
HIPAA Standard, PCI DSS V2.0, and AUP V5.0
Barry L. Williams
ISBN 978-1-4665-8058-9
Investigating Computer-Related Crime,
Second Edition
Peter Stephenson and Keith Gilbert
ISBN 978-0-8493-1973-0
Managing Risk and Security in Outsourcing
IT Services: Onshore, Offshore and the Cloud
Frank Siepmann
ISBN 978-1-4398-7909-2
PRAGMATIC Security Metrics: Applying
Metametrics to Information Security
W. Krag Brotby and Gary Hinson
ISBN 978-1-4398-8152-1
Responsive Security: Be Ready to Be Secure
Meng-Chow Kang
ISBN 978-1-4665-8430-3
Securing Cloud and Mobility:
A Practitioner’s Guide
Ian Lim, E. Coleen Coolidge, Paul Hourani
ISBN 978-1-4398-5055-8
Security and Privacy in Smart Grids
Edited by Yang Xiao
ISBN 978-1-4398-7783-8
Security for Service Oriented Architectures
Walter Williams
ISBN 978-1-4665-8402-0
Security without Obscurity:
A Guide to Condentiality,
Authentication, and Integrity
J.J. Stapleton
ISBN 978-1-4665-9214-8
The Complete Book of Data Anonymization:
From Planning to Implementation
Balaji Raghunathan
ISBN 978-1-4398-7730-2
The Frugal CISO: Using Innovation and
Smart Approaches to Maximize
Your Security Posture
Kerry Ann Anderson
ISBN 978-1-4822-2007-0
The Practical Guide to HIPAA Privacy and
Security Compliance, Second Edition
Rebecca Herold and Kevin Beaver
ISBN 978-1-4398-5558-4
Secure Data Provenance and Inference
Control with Semantic Web
Bhavani Thuraisingham, Tyrone Cadenhead,
Murat Kantarcioglu, and Vaibhav Khadilkar
ISBN 978-1-4665-6943-0
Secure Development for Mobile Apps:
How to Design and Code Secure Mobile
Applications with PHP and JavaScript
J. D. Glaser
ISBN 978-1-4822-0903-7
AUERBACH PUBLICATIONS
www.auerbach-publications.com • To Order Call: 1-800-272-7737 • E-mail: orders@crcpress.com
ANDROID MALWARE
AND ANALYSIS
Ken Dunham • Shane Hartman
Jose Andre Morales
Manu Quintans • Tim Strazzere
剩余231页未读,继续阅读
bingbingcha
- 粉丝: 50
- 资源: 24
上传资源 快速赚钱
- 我的内容管理 收起
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
会员权益专享
最新资源
- RTL8188FU-Linux-v5.7.4.2-36687.20200602.tar(20765).gz
- c++校园超市商品信息管理系统课程设计说明书(含源代码) (2).pdf
- 建筑供配电系统相关课件.pptx
- 企业管理规章制度及管理模式.doc
- vb打开摄像头.doc
- 云计算-可信计算中认证协议改进方案.pdf
- [详细完整版]单片机编程4.ppt
- c语言常用算法.pdf
- c++经典程序代码大全.pdf
- 单片机数字时钟资料.doc
- 11项目管理前沿1.0.pptx
- 基于ssm的“魅力”繁峙宣传网站的设计与实现论文.doc
- 智慧交通综合解决方案.pptx
- 建筑防潮设计-PowerPointPresentati.pptx
- SPC统计过程控制程序.pptx
- SPC统计方法基础知识.pptx
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功
评论4