Amazon Price: $49.99 $32.94 You save: $17.05 (34%). (as of August 18, 2017 04:11 –
Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps.
This is becoming an increasingly important topic as the Android marketplace grows and developers are unwittingly releasing the apps with lots of back doors allowing people to potentially obtain credit card information and database logins to back-end systems, as they don’t realize how easy it is to decompile their Android code.
In depth examination of the Java and Android class file structures Tools and techniques for decompiling Android apps Tools and techniques for protecting your Android apps
What you’ll learn How to download an Android app and decompile it into its original Java source and HTML5 and CSS code How to protect your Android apps so that others cannot decompile it To identify potential security threats that currently exist and how to avoid them What tools are available to decompile and protect Android apps The structure of a Java Classfile and an Android classfile How the standard JVM and the Dalvik JVM differ How to create your own Android decompiler and obfuscator
Who this book is for
This book is for Android developers and their managers. It's also for hackers and hobbyist types who wish to see how Android apps are constructed as a means of learning how to build Android apps.
Continue reading “Decompiling Android”
Amazon Price: N/A (as of August 18, 2017 07:26 –
Millions of public Twitter streams harbor a wealth of data, and once you mine them, you can gain some valuable insights. This short and concise book offers a collection of recipes to help you extract nuggets of Twitter information using easy-to-learn Python tools. Each recipe offers a discussion of how and why the solution works, so you can quickly adapt it to fit your particular needs. The recipes include techniques to:Use OAuth to access Twitter dataCreate and analyze graphs of retweet relationshipsUse the streaming API to harvest tweets in realtimeHarvest and analyze friends and followersDiscover friendship cliquesSummarize webpages from short URLs
This book is a perfect companion to O’Reilly's Mining the Social Web.
Amazon Price: N/A (as of August 18, 2017 08:04 –
Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book.
The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
Continue reading “Hacking the Code: Auditor's Guide to Writing Secure Code for the Web”