This article is a computer class of high-quality pre-sale recommendation >>>>Android system security and anti-compilation combat
Android security Specialist writing, from the introduction of Android security to comprehensive walkthrough, is a must-have guide to complete learning about Android system security knowledge
Content Introduction
"Android system security and anti-compilation combat" gradually explained the basic knowledge of Android system security, from the beginning of Android system introduction to the actual combat process of the comprehensive instance, the entire analysis of the Android system security, application security development and encryption, decryption of the core knowledge. A total of 17 chapters, the main content includes, Android technology core framework analysis, access and compile source code, Android security mechanism, memory security mechanism, binder Communication security mechanism, Android Virtual Machine Foundation, Dalvik VM operation process, Dex file Write secure application, application security policy, file encryption, security mechanism of telephone system, security mechanism of SMS system, network Firewall system, file encryption system and other core technologies.
"Android Security and anti-compilation combat" for Android beginners, Android app developers, Android security architecture researchers, Android low-level developers and Android source code analyst learning, It can also be used as a teaching book for related majors in the relevant training schools and tertiary institutions.
As a translator
Yang, Master of Computer Science, master of Software engineering. Currently working in a well-known domestic security company Mobile project team, specifically to solve mobile Android device data encryption, vulnerability check analysis and encryption work. Proficient in C, C + +, Java, Linux, assembly, ARM, good at vulnerability lookup analysis, System security Architecture and anti-compilation. 2010, was the first to discover Microsoft IE7 's major loopholes, and put forward a specific patch plan, caused by Microsoft attention. With the rise of mobile devices, the vulnerabilities and security risks of mainstream mobile platforms such as Android and iOS have been analyzed in detail and significant results have been achieved.
Partial catalogs
1th Android Technology Overview 1
1.1 Introduction to Smart phone system 1
1.2 Build Android Application development environment 2
1.2.1 Installing the Android SDK
System Requirements 2
1.2.2 Installing JDK 2
1.2.3 Get and install Eclipse and
Android SDK 5
1.2.4 Installing ADT 7
1.2.5 Set Android SDK Home 8
1.2.6 Verifying the development environment 9
1.2.7 Creating an Android virtual device (AVD) 9
1.2.8 Start the AVD simulator
1.2.9 to solve the process of building the environment
FAQ for
The 2nd Chapter of Android Technology core framework Analysis
2.1 Brief analysis of Android installation files
2.1.1 Android SDK directory structure
2.1.2 Android.jar and internal structure
2.1.3 Reading the SDK Help documentation
2.1.4 Common SDK Tools 17
2.2 Demo Official Example 19
2.3 Anatomy of the Android system architecture 23
2.3.1 Android Architecture Introduction 23
2.3.2 Android Application Engineering
File Composition 25
2.4 Description of the five major components 27
2.4.1 using activity to represent the interface 27
2.4.2 with intent and intent Filters
Implementing switchover 28
2.4.3 Service for you 28
2.4.4 sending broadcasts with broadcast Intent/receiver 29
2.4.5 with content Provider
Storing data 29
2.5 Processes and Threads 29
2.5.1 First Look at process 29
2.5.2 See thread 30 again
2.5.3 life cycle of applications 30
Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.
Android system security and anti-compilation combat--Interactive publishing network