買這商品的人也買了...
-
$620$527 -
$820$648 -
$580$493 -
$1,912Android Forensics: Investigation, Analysis and Mobile Security for Google Android (Paperback)
-
$520$411 -
$480$379 -
$580$458 -
$580$493 -
$580$458 -
$450$356 -
$580$458 -
$400$380 -
$360$284 -
$520$199 -
$2,780$2,641 -
$680$537 -
$560$437 -
$550$435 -
$360$252 -
$780$616 -
$560$442 -
$450$356 -
$400$316 -
$520$442 -
$500$395
相關主題
商品描述
Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps.
This is becoming an increasingly important topic as the Android marketplace grows and developers are unwittingly releasing the apps with lots of back doors allowing people to potentially obtain credit card information and database logins to back-end systems, as they don’t realize how easy it is to decompile their Android code.
- In depth examination of the Java and Android class file structures
- Tools and techniques for decompiling Android apps
- Tools and techniques for protecting your Android apps
What you’ll learn
- How to download an Android app and decompile it into its original Java source and HTML5 and CSS code
- How to protect your Android apps so that others cannot decompile it
- To identify potential security threats that currently exist and how to avoid them
- What tools are available to decompile and protect Android apps
- The structure of a Java Classfile and an Android classfile
- How the standard JVM and the Dalvik JVM differ
- How to create your own Android decompiler and obfuscator
Who this book is for
This book is for Android developers and their managers. It's also for hackers and hobbyist types who wish to see how Android apps are constructed as a means of learning how to build Android apps.
Table of Contents
- Laying the Groundwork
- Ghost in the Machine
- Inside the DEX File
- Tools of the Trade
- Decompiler Design
- Decompiler Implementation
- Case Studies
商品描述(中文翻譯)
「反編譯 Android」探討了為何 Android 應用程式可以被反編譯以恢復其原始碼,這對於 Android 開發者意味著什麼,以及如何保護你的程式碼免受窺視。這也是一種了解好壞 Android 應用程式建構方式並從中學習的好方法。
隨著 Android 市場的成長,開發者不自覺地釋出了許多後門,讓人們有可能獲取信用卡資訊和後端系統的資料庫登入,因為他們不了解反編譯 Android 程式碼的容易程度,這成為一個越來越重要的議題。
本書內容包括:
- 深入探討 Java 和 Android 類別檔結構
- 反編譯 Android 應用程式的工具和技術
- 保護 Android 應用程式的工具和技術
你將學到:
- 如何下載 Android 應用程式並將其反編譯為原始的 Java 程式碼、HTML5 和 CSS 程式碼
- 如何保護你的 Android 應用程式,使他人無法反編譯
- 辨識目前存在的潛在安全威脅以及如何避免它們
- 可用於反編譯和保護 Android 應用程式的工具
- Java 類別檔和 Android 類別檔的結構
- 標準 JVM 和 Dalvik JVM 的差異
- 如何建立自己的 Android 反編譯器和混淆器
本書適合 Android 開發者及其管理者閱讀,同時也適合駭客和愛好者,他們希望透過了解 Android 應用程式的建構方式來學習如何建立 Android 應用程式。
目錄:
1. 奠定基礎
2. 機器中的鬼魂
3. DEX 檔案內部
4. 工具
5. 反編譯器設計
6. 反編譯器實作
7. 個案研究