Android Hacker's Handbook and over 2 million other books are available for Amazon Kindle . Learn more
  • RRP: £33.99
  • You Save: £13.34 (39%)
FREE Delivery in the UK.
Only 2 left in stock (more on the way).
Dispatched from and sold by Amazon.
Gift-wrap available.
Quantity:1
Android Hacker's Handbook has been added to your Basket
+ £2.80 UK delivery
Used: Good | Details
Sold by sales-de
Condition: Used: Good
Comment: dispatched today or following business day, expected latest delivery in UK within 10 days
Trade in your item
Get a £10.10
Gift Card.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 3 images

Android Hacker's Handbook Paperback – 18 Apr 2014

19 customer reviews

See all 3 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle Edition
"Please retry"
Paperback
"Please retry"
£20.65
£16.92 £16.90
£20.65 FREE Delivery in the UK. Only 2 left in stock (more on the way). Dispatched from and sold by Amazon. Gift-wrap available.

Frequently Bought Together

Android Hacker's Handbook + Android Security Internals: An In-Depth Guide to Android's Security Architecture
Price For Both: £54.15

Buy the selected items together


Trade In this Item for up to £10.10
Trade in Android Hacker's Handbook for an Amazon Gift Card of up to £10.10, which you can then spend on millions of items across the site. Trade-in values may vary (terms apply). Learn more

Product details

  • Paperback: 576 pages
  • Publisher: John Wiley & Sons; 1 edition (18 April 2014)
  • Language: English
  • ISBN-10: 111860864X
  • ISBN-13: 978-1118608647
  • Product Dimensions: 18.8 x 2.8 x 23.6 cm
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (19 customer reviews)
  • Amazon Bestsellers Rank: 34,413 in Books (See Top 100 in Books)
  • See Complete Table of Contents


Product Description

From the Back Cover

A complete guide to securing the Android operating system

The Android Hacker s Handbook provides network security professionals and mobile device administrators with the specifics of the Android operating system from a security standpoint. This book explains how the operating system works, security risks associated with it, and the overall security architecture of the operating system. It also explains how vulnerabilities can be found in, and exploits developed for, various components of the system.

Written by some of the world s foremost Android security researchers, the Android Hacker s Handbook is the only resource of its kind to explore Android security on this level. This essential guide includes both implementation details as well as complexities introduced by the open nature of the OS.

Learn to:

  • Become familiar with security implementation details, as well as complexities introduced by the open nature of the Android OS
  • Avoid common security pitfalls and stay ahead of the latest smartphone hacking strategies
  • Review the various types of attacks that have been successful against the Android OS
  • Explore rooting and gain an understanding of the partition layout, boot process
  • Understand the complex nature of the Android ecosystem, including the impact of various hardware vendors and software developers

About the Author

JOSHUA J. DRAKE is a Director of Research Science at Accuvant LABS.

PAU OLIVA FORA is a Mobile Security Engineer with viaForensics.

ZACH LANIER is a Senior Security Researcher at Duo Security.

COLLIN MULLINER is a postdoctoral researcher at Northeastern University.

STEPHEN A. RIDLEY is a Principal Researcher with Xipiter.

GEORG WICHERSKI is a Senior Security Researcher with CrowdStrike.


Inside This Book

(Learn More)
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index | Back Cover
Search inside this book:

What Other Items Do Customers Buy After Viewing This Item?

Customer Reviews

4.2 out of 5 stars
Share your thoughts with other customers

Most Helpful Customer Reviews

3 of 3 people found the following review helpful By R. F. Stevens HALL OF FAMETOP 50 REVIEWER on 20 Aug. 2014
Format: Paperback Vine Customer Review of Free Product ( What's this? )
Clearly and logically written using good English, in a well structured layout designed for dipping into, this could be a superb and comprehensive reference book on all aspects of Security in the Android environment, if it were not for the fact that within a few months it might well be already out of date in the finer details. Fortunately it also covers methods and techniques that are timeless, and it lays out the innate architecture and underlying essence of Android - both its strengths and weaknesses. The authors also provide a link to the publishers website to enable readers to update themselves with new developments and relevant code.

It has taken me a while to skim through this thick tome, enough to appreciate the depth of knowledge on show here from the collection of contributors. I have a technical background in these matters, having built several different computers from scratch from as long ago as 1980 when one had to design and make the circuits and write the operating system and tools. So I recognised the words and syntax and in most cases what was being discussed, and I know enough Unix and system languages to fully understand the reasoning and techniques.

However it is still beyond my ability level (old age?) to be able to actually use it effectively in the manner intended by the authors, and there are just too many software tools to learn which one needs to be able explore more deeply the methods and analyse the results. The topic is just too big! It would be a full-time occupation to use this book to the best advantage; which points to the most likely reader being a student or developer, both of whom will find it invaluable.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Steve Benner TOP 1000 REVIEWERVINE VOICE on 15 Aug. 2014
Format: Paperback Vine Customer Review of Free Product ( What's this? )
The "Android Hacker's Handbook" is a comprehensive guide to the Android operating system and its vulnerabilities, aimed at seasoned network security experts and mobile device specialists. In preparing the text, Wiley have drawn together a raft of expert technical authors: Joshua Drake, Director of Research Science, Accuvant Labs; Pau Oliva Fora, Mobile Security Engineer with viaForensics; Zach Lanier, Senior Security Researcher at Duo Security; Collin Mulliner, postdoc researcher at Northeastern University; Stephen A. Ridley, Principal Researcher with Xipiter; and Georg Wicherski, Senior Security Researcher with CrowdStrike. They have also done an excellent editing job, ensuring that the seams between the variously authored sections are invisible, with perfect continuity of style and clarity of presentation.

The book is highly technical but progresses logically and systematically from the opening chapter's consideration of the Android ecosystem with particular emphasis on the security implications arising from implementation fragmentation and compatibility issues, through specific features of Android design and functionality and the vulnerabilities arising therefrom, and finally wrapping everything up with an exposition of the possibilities arising from direct access to Android devices' hardware components to further research device vulnerabilities.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By VINE VOICE on 2 July 2014
Format: Paperback Vine Customer Review of Free Product ( What's this? )
Android is fine when it leaves Google. It's what happens afterwards that is worrying. It is OK if you have a Nexus device, because they get updated with security fixes and new versions regularly. (But for how long?)

The bad boys are the manufacturers and networks, both of whom add a layer of alteration to the pristine Android supplied by Google and customize it, maybe introduce bugs and security issues, and then perhaps don't even release any update.

It is thus surprising that Android is so good. Despite the above shortcomings it is rapidly becoming the Number One mobile OS in all countries, even the USA. One consequence of having so many OEMs and versions is that any exploit that works on one phone will have little chance of working on many others, as is made clear in this book.

If you always wondered what an unlocked bootloader was, what happens when you root a phone, or why you do it one way for one phone and another way for another, and what first rate security layers are already in your phone then this is for you. It isn't light reading, but then, did you expect it to be?
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
By The Fat Monk TOP 500 REVIEWER on 1 Sept. 2014
Format: Paperback Vine Customer Review of Free Product ( What's this? )
This is absolutely not a 'get started in hacking Android' book.

Neither is a beginners guide to making your Android Apps secure.

This is an in-depth look at ow security works (and has failed in the past) on the Android OS platform.

I'm not a security professional, nor am I a professional programmer - though I do dabble in a bit of coding for web, PC, Linux and Android - but being a geek at heart I find dipping in and out of this fascinating.

For a professional this book certainly seems to have a lot of information that you should be aware of. If you are aware of it already, great. If not then you need this book. It's one of those 'if you don't know what you don't know' situations... you need this book to make sure you've at least thought of what others have though of before.

You're never going to be completely ahead of the hacking curve, but this book tells you how the OS has been hacked in the past with general methods and specific details. The examples, though, are backed up with a wealth of general information about how the OS works which should give you the best chance of plugging some holes before they are exploited.

To the novice it may be surprising just how similar some of these previous attack methods have been. To the expert it should be a lesson in how not to get bitten twice.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews



Feedback