Atjaunināt sīkdatņu piekrišanu

Android Malware 2013 ed. [Mīkstie vāki]

  • Formāts: Paperback / softback, 44 pages, height x width: 235x155 mm, weight: 1007 g, 9 Illustrations, black and white; XI, 44 p. 9 illus., 1 Paperback / softback
  • Sērija : SpringerBriefs in Computer Science
  • Izdošanas datums: 13-Jun-2013
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1461473934
  • ISBN-13: 9781461473930
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 44 pages, height x width: 235x155 mm, weight: 1007 g, 9 Illustrations, black and white; XI, 44 p. 9 illus., 1 Paperback / softback
  • Sērija : SpringerBriefs in Computer Science
  • Izdošanas datums: 13-Jun-2013
  • Izdevniecība: Springer-Verlag New York Inc.
  • ISBN-10: 1461473934
  • ISBN-13: 9781461473930
Citas grāmatas par šo tēmu:

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns.

Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.

1 Introduction
1(2)
2 A Survey of Android Malware
3(18)
2.1 Malware Dataset
3(2)
2.2 Malware Characterization
5(16)
2.2.1 Malware Installation
5(7)
2.2.2 Activation
12(1)
2.2.3 Malicious Payloads
13(5)
2.2.4 Permission Usage
18(3)
3 Case Studies
21(10)
3.1 Malware I: Plankton
21(2)
3.1.1 Phoning Home
21(1)
3.1.2 Dynamic Execution
22(1)
3.2 Malware II: DroidKungFu
23(3)
3.2.1 Root Exploits
24(1)
3.2.2 Command and Control (C&C) Servers
24(2)
3.2.3 Payloads
26(1)
3.2.4 Obfuscation, JNI, and Others
26(1)
3.3 Malware III: AnserverBot
26(5)
3.3.1 Anti-Analysis
27(1)
3.3.2 Command and Control (C&C) Servers
28(3)
4 Discussion
31(2)
5 Additional Reading
33(4)
5.1 Books
33(1)
5.1.1 Malware Detection and Defense
33(1)
5.1.2 Smartphone (Apps) Security
34(1)
5.2 Conference and Workshop Proceedings
34(3)
6 Summary
37(2)
References 39(4)
Index 43