Android malware and analysis / Ken Dunham, Shane Hartman, Jose Andre Morales, Manu Quintans, Tim Strazzere.
Material type:
Item type | Current library | Call number | Status | Date due | Barcode |
---|---|---|---|---|---|
![]() |
Pusat Sumber Pendidikan IABI | 005.84 DUN 2014 (Browse shelf (Opens below)) | Available | 0000010975 | |
![]() |
Pusat Sumber Pendidikan IABI | 005.84 DUN 2014 (Browse shelf (Opens below)) | Available | 0000010976 | |
![]() |
Pusat Sumber Pendidikan IABI | 005.84 DUN 2014 (Browse shelf (Opens below)) | Available | 0000010977 |
Browsing Pusat Sumber Pendidikan IABI shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
005.82 MCA 2011 Introduction to cryptography with open-source software / | 005.82 MCA 2011 Introduction to cryptography with open-source software / | 005.82 MCA 2011 Introduction to cryptography with open-source software / | 005.84 DUN 2014 Android malware and analysis / | 005.84 DUN 2014 Android malware and analysis / | 005.84 DUN 2014 Android malware and analysis / | 006 SEM 2014 Semantic multimedia analysis and processing / |
Includes bibliographical references (pages 205-208) and index.
Chapter 1. Introduction to the Android operating system and threats -- chapter 2. Malware threats, hoaxes, and taxonomy -- chapter 3. Open source tools -- chapter 4. Static analysis -- chapter 5. Android malware evolution -- chapter 6. Android malware trends and reversing tactics -- chapter 7. Behavioral analysis -- chapter 8. Building your own sandbox -- chapter 9. Case study examples.
There are no comments on this title.