0%

Book Description

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.In Android Malware and Analysis, K

Table of Contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface
  6. Acknowledgments
  7. Authors
  8. Conventions
  9. Chapter 1: Introduction to the Android Operating System and Threats (1/2)
  10. Chapter 1: Introduction to the Android Operating System and Threats (2/2)
  11. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (1/6)
  12. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (2/6)
  13. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (3/6)
  14. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (4/6)
  15. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (5/6)
  16. Chapter 2: Malware Threats, Hoaxes, and Taxonomy (6/6)
  17. Chapter 3: Open Source Tools (1/4)
  18. Chapter 3: Open Source Tools (2/4)
  19. Chapter 3: Open Source Tools (3/4)
  20. Chapter 3: Open Source Tools (4/4)
  21. Chapter 4: Static Analysis (1/4)
  22. Chapter 4: Static Analysis (2/4)
  23. Chapter 4: Static Analysis (3/4)
  24. Chapter 4: Static Analysis (4/4)
  25. Chapter 5: Android Malware Evolution (1/2)
  26. Chapter 5: Android Malware Evolution (2/2)
  27. Chapter 6: Android Malware Trends and Reversing Tactics (1/3)
  28. Chapter 6: Android Malware Trends and Reversing Tactics (2/3)
  29. Chapter 6: Android Malware Trends and Reversing Tactics (3/3)
  30. Chapter 7: Behavioral Analysis (1/8)
  31. Chapter 7: Behavioral Analysis (2/8)
  32. Chapter 7: Behavioral Analysis (3/8)
  33. Chapter 7: Behavioral Analysis (4/8)
  34. Chapter 7: Behavioral Analysis (5/8)
  35. Chapter 7: Behavioral Analysis (6/8)
  36. Chapter 7: Behavioral Analysis (7/8)
  37. Chapter 7: Behavioral Analysis (8/8)
  38. Chapter 8: Building Your Own Sandbox (1/10)
  39. Chapter 8: Building Your Own Sandbox (2/10)
  40. Chapter 8: Building Your Own Sandbox (3/10)
  41. Chapter 8: Building Your Own Sandbox (4/10)
  42. Chapter 8: Building Your Own Sandbox (5/10)
  43. Chapter 8: Building Your Own Sandbox (6/10)
  44. Chapter 8: Building Your Own Sandbox (7/10)
  45. Chapter 8: Building Your Own Sandbox (8/10)
  46. Chapter 8: Building Your Own Sandbox (9/10)
  47. Chapter 8: Building Your Own Sandbox (10/10)
  48. Chapter 9: Case Study Examples (1/6)
  49. Chapter 9: Case Study Examples (2/6)
  50. Chapter 9: Case Study Examples (3/6)
  51. Chapter 9: Case Study Examples (4/6)
  52. Chapter 9: Case Study Examples (5/6)
  53. Chapter 9: Case Study Examples (6/6)
  54. Bibliography
  55. Back Cover
3.144.93.73