Android Application Security Essentials: Chapter 5 – Respect Your Users

“Android Application Security Essentials” will show you how to secure your Android applications and data. It will equip you with tricks and tips that will come in handy as you develop your applications.
We will start by learning the overall security architecture of the Android stack. Securing components with permissions, defining security in a manifest file, cryptographic algorithms and protocols on the Android stack, secure storage, security focused testing, and protecting enterprise data on your device is then also discussed in detail. You will also learn how to be security-aware when integrating newer technologies like NFC and mobile payments into your Android applications.

At the end of this book, you will understand Android security at the system level all the way to the nitty-gritty details of application security for securing your Android applications.

This book will help you:

  • Understand Android security from kernel to the application layer
  • Protect components using permissions
  • Safeguard user and corporate data from prying eyes
  • Understand the security implications of mobile payments, NFC, and more

Request Free!

Better BYOD with Pulse Secure and MDM Partners

When organizations allow their employees and guests to use any device to access the network, they gain in productivity and user satisfaction, but this freedom comes with significant security risks.Together with its partners, Pulse Secure has overcome t…

How Data Integration Drives Business Agility

This infographic highlights how organizations maximize their business agility by integrating data into the workflow of individual business units, taking the strain off IT without sacrificing quality and enabling faster access to data.Request Free!

Unlocking Internet of Things for Business

By now you have heard of the Internet of Things (IoT) and it’s dominating presence as a technology phenomenon. As IoT continues to gain momentum with each new smart device and prototype, businesses will look to align strategies to support IoT and satis…

Adobe Document Cloud Security Overview

The security of Adobe Document Cloud is a priority for Adobe. The Document Cloud services, both eSign services and PDF services, use a rigorous approach to protecting the confidentiality, integrity and availability of our customers’ information. This O…

Mining Gold from Machine Data

Today’s data centers consist of complex, layered groups of siloed and interconnected technologies. These complexities make it difficult to quickly identify and resolve issues, causing user dissatisfaction and dangerous periods of downtime that can impact agencies’ missions.

Learn why gathering and analyzing your machine generated data is one of the best ways to maximize visibility into your data center enabling your organization to:

  • Resolve problems faster
  • Reduce downtime
  • Improve service delivery
  • Detect security threats

You know big data. But do you know about the fastest growing, most complex and valuable segment of big data – machine data?

Request Free!