A Field Manual and Security Reference Guide to Java-based Android Components
Buch, Englisch, 165 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 283 g
ISBN: 978-1-4842-6913-8
Verlag: Apress
Use this handy field guide as a quick reference book and cheat sheet for all of the techniques you use or reference day to day. Covering up to Android 11, this Android Java programming reference guide focuses on non-UI elements with a security focus. You won’t see Android UI development, nor will you see low-level C or kernel techniques. Instead, this book focuses on easily digestible, useful, and interesting techniques in Java and the Android system.
This reference guide was created out of the need for myself to jot down all the useful techniques I commonly reached for, and so I’m now sharing these techniques with you, whether you are an Android internals software engineer or security researcher.What You Will Learn
- Discover the differences between and how to access application names, package names, IDs, and unique identifiers in Android
- Quickly reference common techniques such as storage, the activity lifecycle, and permissions
- Debug using the Android shell
- Work with Android's obfuscation and encryption capabilities
- Extract and decompile Android applications
- Carry out Android reflection and dex class loading
Who This Book Is For
Programmers, developers, and admins with at least prior Android and Java experience.
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Angewandte Informatik
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Programmier- und Skriptsprachen
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Handheld Programmierung
Weitere Infos & Material
1. Introduction.- 2. Android Versions.- 3. Fundamentals.- 4. Application Names, Android Package Names and ID.- 5. Storage.- 6. Android Unique Identifiers.- 7. The Android Shell.- 8. Obfuscation and Encryption.- 9. Applications and Services.- 10. Reflection and Dex Class Loading.