Bun Venit
Linckurile de pe forum sunt disponibile doar pentru membri inregistrati!

Alăturați-vă forumului, este rapid și ușor

Bun Venit
Linckurile de pe forum sunt disponibile doar pentru membri inregistrati!
Doriți să reacționați la acest mesaj? Creați un cont în câteva clickuri sau conectați-vă pentru a continua.

Android Application Secure Design/Secure Coding Guidebook

In jos

Android Application Secure Design/Secure Coding Guidebook Empty Android Application Secure Design/Secure Coding Guidebook

Mesaj  Maftei Vin Aug 08, 2014 11:38 am

Android Application
Secure Design/Secure Coding Guidebook

Cod:
1. Introduction ................................................................................................................................ 9
1.1. Building a Secure Smartphone Society ................................................................................... 9
1.2. Timely Feedback on a Regular Basis Through the Beta Version ............................................. 10
1.3. Usage Agreement of the Guidebook .................................................................................... 11
2. Composition of the Guidebook .................................................................................................. 12
2.1. Developer's Context ............................................................................................................ 12
2.2. Sample Code, Rule Book, Advanced Topics .......................................................................... 13
2.3. The Scope of the Guidebook ............................................................................................... 16
2.4. Literature on Android Secure Coding ................................................................................... 17
2.5. Steps to Install Sample Codes into Eclipse ........................................................................... 18
3. Basic Knowledge of Secure Design and Secure Coding ............................................................... 34
3.1. Android Application Security ............................................................................................... 34
3.2. Handling Input Data Carefully and Securely ......................................................................... 47
4. Using Technology in a Safe Way ................................................................................................. 49
4.1. Creating/Using Activities .................................................................................................... 49
4.2. Receiving/Sending Broadcasts ............................................................................................. 93
4.3. Creating/Using Content Providers ..................................................................................... 126
4.4. Creating/Using Services .................................................................................................... 175
4.5. Using SQLite ..................................................................................................................... 219
4.6. Handling Files ................................................................................................................... 237
4.7. Using Browsable Intent ...................................................................................................... 264
4.8. Outputting Log to LogCat .................................................................................................. 268
4.9. Using WebView ................................................................................................................. 280
5. How to use Security Functions ................................................................................................. 291
5.1. Creating Password Input Screens ....................................................................................... 291
5.2. Permission and Protection Level ........................................................................................ 306
5.3. Add In-house Accounts to Account Manager ..................................................................... 334
5.4. Communicating via HTTPS ................................................................................................ 353
6. Difficult Problems ................................................................................................................... 375
6.1. Risk of Information Leakage from Clipboard ...................................................................... 375

[Trebuie sa fiti inscris si conectat pentru a vedea acest link]
Maftei
Maftei
Pro-Security
Pro-Security

Mesaje : 164
Experienta : 2194568938
Reputatie : 14
Data de inscriere : 23/06/2011
Varsta : 27
Localizare : NT

https://pro-security.forum.st

Sus In jos

Sus

- Subiecte similare

 
Permisiunile acestui forum:
Nu puteti raspunde la subiectele acestui forum