50
Used, New, and Out of Print Books - We Buy and Sell - Powell's Books
Cart |
|  my account  |  wish list  |  help   |  800-878-7323
Hello, | Login
MENU
  • Browse
    • New Arrivals
    • Bestsellers
    • Featured Preorders
    • Award Winners
    • Audio Books
    • See All Subjects
  • Used
  • Staff Picks
    • Staff Picks
    • Picks of the Month
    • Bookseller Displays
    • 50 Books for 50 Years
    • 25 Best 21st Century Sci-Fi & Fantasy
    • 25 PNW Books to Read Before You Die
    • 25 Books From the 21st Century
    • 25 Memoirs to Read Before You Die
    • 25 Global Books to Read Before You Die
    • 25 Women to Read Before You Die
    • 25 Books to Read Before You Die
  • Gifts
    • Gift Cards & eGift Cards
    • Powell's Souvenirs
    • Journals and Notebooks
    • socks
    • Games
  • Sell Books
  • Blog
  • Events
  • Find A Store

Don't Miss

  • Spring Sale
  • Scientifically Proven Sale
  • Powell's Author Events
  • Oregon Battle of the Books
  • Audio Books

Visit Our Stores


Jinwoo Chong: Clock In: Jinwoo Chong’s Playlist for 'Flux' (0 comment)
I had my first inklings of the novel that eventually became Flux about a year after I was laid off from my first job after college, the result of a corporate takeover of my company that eliminated my entire department. While a tough hurdle to overcome at twenty-one years old, I learned a lot about self-sufficiency....

Read More»

  • Esther Yi: The Writers That Haunt Me: Esther Yi’s Bookshelf for 'Y/N' (0 comment)
  • Kelsey Ford: 10 Books That Celebrate Women’s Rights and Women’s Wrongs (0 comment)

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##

Bulletproof Android Practical Advice For Building Secure Apps

by Godfrey Nolan
Bulletproof Android Practical Advice For Building Secure Apps

  • Comment on this title
  • Synopses & Reviews

ISBN13: 9780133993325
ISBN10: 0133993329



All Product Details

View Larger ImageView Larger Images
Ships free on qualified orders.
Add to Cart
0.00
Trade Paperback
Ships in 1 to 3 days
Add to Wishlist

Synopses & Reviews

Publisher Comments

Battle-Tested Best Practices for Securing Android Apps throughout the Development Lifecycle

 

Android’s immense popularity has made it today’s #1 target for attack: high-profile victims include eHarmony, Facebook, and Delta Airlines, just to name a few. Today, every Android app needs to resist aggressive attacks and protect data, and in Bulletproof Android™, Godfrey Nolan shows you how.

 

Unlike “black hat/gray hat” books, which focus on breaking code, this guide brings together complete best practices for hardening code throughout the entire development lifecycle. Using detailed examples from hundreds of apps he has personally audited, Nolan identifies common “anti-patterns” that expose apps to attack, and then demonstrates more secure solutions.

 

Nolan covers authentication, networking, databases, server attacks, libraries, hardware, and more. He illuminates each technique with code examples, offering expert advice on implementation and trade-offs. Each topic is supported with a complete sample app, which demonstrates real security problems and solutions.

 

Learn how to

  • Apply core practices for securing the platform
  • Protect code, algorithms, and business rules from reverse engineering
  • Eliminate hardcoding of keys, APIs, and other static data
  • Eradicate extraneous data from production APKs
  • Overcome the unique challenges of mobile authentication and login
  • Transmit information securely using SSL
  • Prevent man-in-the-middle attacks
  • Safely store data in SQLite databases
  • Prevent attacks against web servers and services
  • Avoid side-channel data leakage through third-party libraries
  • Secure APKs running on diverse devices and Android versions
  • Achieve HIPAA or FIPS compliance
  • Harden devices with encryption, SELinux, Knox, and MDM
  • Preview emerging attacks and countermeasures

This guide is a perfect complement to Nolan’s Android™ Security Essentials LiveLessons (video training; ISBN-13: 978-0-13-382904-4) and reflects new risks that have been identified since the LiveLessons were released.

Synopsis

Battle-Tested Best Practices for Securing Android Apps throughout the Development Lifecycle

Android's immense popularity has made it today's #1 target for attack: high-profile victims include eHarmony, Facebook, and Delta Airlines, just to name a few. Today, every Android app needs to resist aggressive attacks and protect data, and in Bulletproof Android(TM), Godfrey Nolan shows you how.

Unlike "black hat/gray hat" books, which focus on breaking code, this guide brings together complete best practices for hardening code throughout the entire development lifecycle. Using detailed examples from hundreds of apps he has personally audited, Nolan identifies common "anti-patterns" that expose apps to attack, and then demonstrates more secure solutions.

Nolan covers authentication, networking, databases, server attacks, libraries, hardware, and more. He illuminates each technique with code examples, offering expert advice on implementation and trade-offs. Each topic is supported with a complete sample app, which demonstrates real security problems and solutions.

Learn how to

  • Apply core practices for securing the platform
  • Protect code, algorithms, and business rules from reverse engineering
  • Eliminate hardcoding of keys, APIs, and other static data
  • Eradicate extraneous data from production APKs
  • Overcome the unique challenges of mobile authentication and login
  • Transmit information securely using SSL
  • Prevent man-in-the-middle attacks
  • Safely store data in SQLite databases
  • Prevent attacks against web servers and services
  • Avoid side-channel data leakage through third-party libraries
  • Secure APKs running on diverse devices and Android versions
  • Achieve HIPAA or FIPS compliance
  • Harden devices with encryption, SELinux, Knox, and MDM
  • Preview emerging attacks and countermeasures
This guide is a perfect complement to Nolan's Android(TM) Security Essentials LiveLessons (video training; ISBN-13: 978-0-13-382904-4) and reflects new risks that have been identified since the LiveLessons were released.

Synopsis

In Bulletproof Android, Godfrey Nolan brings together comprehensive, up-to-date best practices for writing apps that resist attack and won't leak information: yours, or your users. Unlike other Android security books focused on "breaking" code, Bulletproof Android focuses on strengthening code security throughout your entire development lifecycle. Nolan thoroughly addresses crucial issues including:

  • Protecting code that communicates with back-end web servers
  • Safeguarding Android databases, including SQLite and SQLcipher
  • Resisting web service attacks via XSS, SQL injection, and other means
  • Using webviews securely
  • Enabling secure user login and information transmission
  • Protecting code and business rules from reverse engineering
  • Safely integrating third-party libraries
  • Taking advantage of encryption, SELinux, Knox, and Mobile Device Management
  • Futureproofing code: DVM, ART, and beyond
  • And much more

Each tactic and technique is presented with working code examples and practical advice -- including expert insights into pros, cons, and tradeoffs. All source code is available for download, and each subsection is supported with a complete sample app that demonstrates security problems and how to solve them.


About the Author

Godfrey Nolan is the founder and president of the mobile and web development company RIIS LLC based in Troy, Michigan, and Belfast, Northern Ireland. This is his fourth book. He has had a healthy obsession with reverse engineering bytecode since he wrote "Decompile Once, Run Anywhere," which first appeared in Web Techniques magazine way back in September 1997. Godfrey is originally from Dublin, Ireland.

Table of Contents

Preface xiii

Acknowledgments xxi

About the Author xxiii

 

Chapter 1: Android Security Issues 1

Why Android? 1

Guidelines 7

Securing the Device 17

Conclusion 18

 

Chapter 2: Protecting Your Code 19

Looking into the classes.dex File 19

Obfuscation Best Practices 24

Smali 39

Hiding Business Rules in the NDK 48

Conclusion 49

 

Chapter 3: Authentication 51

Secure Logins 51

Understanding Best Practices for

User Authentication and Account Validation 54

Application Licensing with LVL 65

OAuth 77

User Behavior 84

Conclusion 86

 

Chapter 4: Network Communication 87

HTTP(S) Connection 88

Symmetric Keys 92

Asymmetric Keys 94

Ineffective SSL 99

Conclusion 107

 

Chapter 5: Android Databases 109

Android Database Security Issues 109

SQLite 110

SQLCipher 116

Hiding the Key 120

SQL Injection 127

Conclusion 129

 

Chapter 6: Web Server Attacks 131

Web Services 131

Cross Platform 135

WebView Attacks 140

Cloud 146

Conclusion 150

 

Chapter 7: Third-Party Library Integration 151

Transferring the Risk 152

Permissions 152

Installing Third-Party Apps 154

Trust but Verify 160

Conclusion 165

 

Chapter 8: Device Security 167

Wiping Your Device 168

Fragmentation 168

Device Encryption 172

SEAndroid 174

FIPS 140-2 176

Mobile Device Management 177

Conclusion 178

 

Chapter 9: The Future 179

More Sophisticated Attacks 179

Internet of Things 186

Audits and Compliance 188

Tools 190

Conclusion 194

 

Index 195


What Our Readers Are Saying

Be the first to share your thoughts on this title!




Product Details

ISBN:
9780133993325
Binding:
Trade Paperback
Publication date:
12/07/2014
Publisher:
Addison-Wesley Professional
Series info:
Developer's Library
Pages:
240
Height:
.50IN
Width:
7.10IN
Thickness:
.75
Illustration:
Yes
Author:
Godfrey Nolan
Author:
Godfrey Nolan

Ships free on qualified orders.
Add to Cart
0.00
Trade Paperback
Ships in 1 to 3 days
Add to Wishlist
Used Book Alert for book Receive an email when this ISBN is available used.
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
  • Twitter
  • Facebook
  • Pinterest
  • Instagram

  • Help
  • Guarantee
  • My Account
  • Careers
  • About Us
  • Security
  • Wish List
  • Partners
  • Contact Us
  • Shipping
  • Transparency ACT MRF
  • Sitemap
  • © 2023 POWELLS.COM Terms

{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]##
{1}
##LOC[OK]## ##LOC[Cancel]##
{1}
##LOC[OK]## ##LOC[Cancel]##