As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.
JOSHUA J. DRAKE is a Director of Research Science at Accuvant LABS.
PAU OLIVA FORA is a Mobile Security Engineer with viaForensics.
ZACH LANIER is a Senior Security Researcher at Duo Security.
COLLIN MULLINER is a postdoctoral researcher at Northeastern University.
STEPHEN A. RIDLEY is a Principal Researcher with Xipiter.
GEORG WICHERSKI is a Senior Security Researcher with CrowdStrike.
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.
"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program
Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.
Discover how to:Perform ethical hacks without compromising a system Combat denial of service and WEP attacks Understand how invaders think Recognize the effects of different hacks Protect against war drivers and rogue devices
This inspiring guide shows you how to use Arduino to create gadgets for measuring noise, weather, electromagnetic interference (EMI), water purity, and more. You’ll also learn how to collect and share your own data, and you can experiment by creating your own variations of the gadgets covered in the book. If you’re new to DIY electronics, the first chapter offers a primer on electronic circuits and Arduino programming.Use a special microphone and amplifier to build a reliable noise monitor Create a gadget to detect energy vampires: devices that use electricity when they’re “off” Examine water purity with a water conductivity device Measure weather basics such as temperature, humidity, and dew point Build your own Geiger counter to gauge background radiation Extend Arduino with an Ethernet shield—and put your data on the Internet Share your weather and radiation data online through Pachube