Android system security and anti-compilation combat--Interactive publishing network

Source: Internet
Author: User

This article is a computer class of high-quality pre-sale recommendation >>>>Android system security and anti-compilation combat


Android security Specialist writing, from the introduction of Android security to comprehensive walkthrough, is a must-have guide to complete learning about Android system security knowledge


Content Introduction

"Android system security and anti-compilation combat" gradually explained the basic knowledge of Android system security, from the beginning of Android system introduction to the actual combat process of the comprehensive instance, the entire analysis of the Android system security, application security development and encryption, decryption of the core knowledge. A total of 17 chapters, the main content includes, Android technology core framework analysis, access and compile source code, Android security mechanism, memory security mechanism, binder Communication security mechanism, Android Virtual Machine Foundation, Dalvik VM operation process, Dex file Write secure application, application security policy, file encryption, security mechanism of telephone system, security mechanism of SMS system, network Firewall system, file encryption system and other core technologies.
"Android Security and anti-compilation combat" for Android beginners, Android app developers, Android security architecture researchers, Android low-level developers and Android source code analyst learning, It can also be used as a teaching book for related majors in the relevant training schools and tertiary institutions.


As a translator

Yang, Master of Computer Science, master of Software engineering. Currently working in a well-known domestic security company Mobile project team, specifically to solve mobile Android device data encryption, vulnerability check analysis and encryption work. Proficient in C, C + +, Java, Linux, assembly, ARM, good at vulnerability lookup analysis, System security Architecture and anti-compilation. 2010, was the first to discover Microsoft IE7 's major loopholes, and put forward a specific patch plan, caused by Microsoft attention. With the rise of mobile devices, the vulnerabilities and security risks of mainstream mobile platforms such as Android and iOS have been analyzed in detail and significant results have been achieved.


Partial catalogs

1th Android Technology Overview 1
1.1 Introduction to Smart phone system 1
1.2 Build Android Application development environment 2
1.2.1 Installing the Android SDK
System Requirements 2
1.2.2 Installing JDK 2
1.2.3 Get and install Eclipse and
Android SDK 5
1.2.4 Installing ADT 7
1.2.5 Set Android SDK Home 8
1.2.6 Verifying the development environment 9
1.2.7 Creating an Android virtual device (AVD) 9
1.2.8 Start the AVD simulator
1.2.9 to solve the process of building the environment
FAQ for
The 2nd Chapter of Android Technology core framework Analysis
2.1 Brief analysis of Android installation files
2.1.1 Android SDK directory structure
2.1.2 Android.jar and internal structure
2.1.3 Reading the SDK Help documentation

2.1.4 Common SDK Tools 17
2.2 Demo Official Example 19
2.3 Anatomy of the Android system architecture 23
2.3.1 Android Architecture Introduction 23
2.3.2 Android Application Engineering
File Composition 25
2.4 Description of the five major components 27
2.4.1 using activity to represent the interface 27
2.4.2 with intent and intent Filters
Implementing switchover 28
2.4.3 Service for you 28
2.4.4 sending broadcasts with broadcast Intent/receiver 29
2.4.5 with content Provider
Storing data 29
2.5 Processes and Threads 29
2.5.1 First Look at process 29
2.5.2 See thread 30 again
2.5.3 life cycle of applications 30



Copyright NOTICE: This article for Bo Master original article, without Bo Master permission not reproduced.

Android system security and anti-compilation combat--Interactive publishing network

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.