001434871 000__ 03606cam\a2200601\i\4500 001434871 001__ 1434871 001434871 003__ OCoLC 001434871 005__ 20230309003823.0 001434871 006__ m\\\\\o\\d\\\\\\\\ 001434871 007__ cr\un\nnnunnun 001434871 008__ 210316s2021\\\\cau\\\\\o\\\\\001\0\eng\d 001434871 019__ $$a1243544316$$a1244118887$$a1244631049$$a1245668766$$a1249107334$$a1250576394 001434871 020__ $$a9781484269145$$q(electronic bk.) 001434871 020__ $$a1484269144$$q(electronic bk.) 001434871 020__ $$z9781484269138 001434871 020__ $$z1484269136 001434871 0247_ $$a10.1007/978-1-4842-6914-5$$2doi 001434871 035__ $$aSP(OCoLC)1241731361 001434871 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dDCT$$dEBLCP$$dOCLCO$$dSFB$$dOCLCF$$dUKAHL$$dCZL$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCQ 001434871 049__ $$aISEA 001434871 050_4 $$aQA76.76.D47 001434871 08204 $$a005.258$$223 001434871 1001_ $$aStevenson, James,$$eauthor. 001434871 24510 $$aAndroid software internals quick reference :$$ba field manual and security reference guide to Java-based Android components /$$cJames Stevenson. 001434871 264_1 $$a[Berkeley] :$$bApress,$$c[2021] 001434871 300__ $$a1 online resource 001434871 336__ $$atext$$btxt$$2rdacontent 001434871 337__ $$acomputer$$bc$$2rdamedia 001434871 338__ $$aonline resource$$bcr$$2rdacarrier 001434871 347__ $$atext file 001434871 347__ $$bPDF 001434871 500__ $$aIncludes index. 001434871 5050_ $$a1. Introduction -- 2. Android Versions -- 3. Fundamentals -- 4. Application Names, Android Package Names and ID -- 5. Storage -- 6. Android Unique Identifiers -- 7. The Android Shell -- 8. Obfuscation and Encryption -- 9. Applications and Services -- 10. Reflection and Dex Class Loading. 001434871 506__ $$aAccess limited to authorized users. 001434871 520__ $$aUse this handy field guide as a quick reference book and cheat sheet for all of the techniques you use or reference day to day. Covering up to Android 11, this Android Java programming reference guide focuses on non-UI elements with a security focus. You wont see Android UI development, nor will you see low-level C or kernel techniques. Instead, this book focuses on easily digestible, useful, and interesting techniques in Java and the Android system. This reference guide was created out of the need for myself to jot down all the useful techniques I commonly reached for, and so Im now sharing these techniques with you, whether you are an Android internals software engineer or security researcher. You will: Discover the differences between and how to access application names, package names, IDs, and unique identifiers in Android Quickly reference common techniques such as storage, the activity lifecycle, and permissions Debug using the Android shell Work with Android's obfuscation and encryption capabilities Extract and decompile Android applications Carry out Android reflection and dex class loading. 001434871 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed April 13, 2021). 001434871 63000 $$aAndroid (Electronic resource) 001434871 650_0 $$aJava (Computer program language) 001434871 650_0 $$aMobile computing. 001434871 650_0 $$aComputer security. 001434871 650_6 $$aInformatique mobile. 001434871 650_6 $$aJava (Langage de programmation) 001434871 650_6 $$aLogiciels. 001434871 650_6 $$aInformatique. 001434871 650_6 $$aSécurité informatique. 001434871 655_0 $$aElectronic books. 001434871 77608 $$iPrint version:$$aStevenson, James.$$tAndroid software internals quick reference.$$d[Berkeley] : Apress, [2021]$$z1484269136$$z9781484269138$$w(OCoLC)1230231936 001434871 852__ $$bebk 001434871 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-6914-5$$zOnline Access$$91397441.1 001434871 909CO $$ooai:library.usi.edu:1434871$$pGLOBAL_SET 001434871 980__ $$aBIB 001434871 980__ $$aEBOOK 001434871 982__ $$aEbook 001434871 983__ $$aOnline 001434871 994__ $$a92$$bISE