"It is a must-have for security architects and consultants as well as enterprise security managers who are working with mobile devices and applications."Dr. Dena Haritos Tsamitis, Director, Information Networking Institute (INI) Director of Education, CyLab Carnegie Mellon University
"Good book for Android security enthusiasts and developers that also covers advance topic like reverse engineering of Android applications. A must have book for all security professionals."Sanjay Katkar, Co-Founder Quick Heal Technologies
"It's an excellent book for professional businesses that are trying to move their corporate applications on mobile / Android platform. It helped me understand the threats foreseen in Android applications and how to protect against them. Thanks for putting together a structured text on Android security."Jagmeet Malhotra, Vice President, Royal Bank of Scotland
"Smart mobile devices need smart security. If you are facing the complex challenge of securing data and applications for Android, this book provides valuable insight into the security architecture and practical guidance for safeguarding this modern platform."Gerhard Eschelbeck, Chief Technology Officer, Sophos
"Abhishek and Anmol's book Android Security: Attacks & Defenses is a great introduction to Android security. Their chapter "Reverse Engineering Android Applications" provides the groundwork for anybody interested in mobile malware analysis and cracking the nitty-gritty of most Android apps."Nicholas Falliere, Founder JEB Decompiler & Security Researcher
"In their book Android Security: Attacks and Defenses, Dubey and Misra have filled a critical gap in software security literature by providing a unique and holistic approach to addressing this critical and often misunderstood topic..."James Ransome, Senior Director, Product Security McAfee . An Intel Company
The book gives security professionals and executives a practical guide to the security implications and best practices for deploying Android platforms and applications in the (corporate) environment.Steve Martino, VP Information Security, Cisco
Ever-present cyber threats have been increasing against mobile devices in recent years. As Android emerges as the leading platform for mobile devices, security issues associ- ated with the Android platform become a growing concern for personal and enterprise customers. Android Security: Attacks and Defenses provides the reader with a sense of preparedness by breaking down the history of Android and its features and addressing the methods of attack, ultimately giving professionals, from mobile application developers to security architects, an understanding of the necessary groundwork for a good defense.
In the context and broad realm of mobility, Dubey and Misra bring into focus the rise of Android to the scene and the security challenges of this particular platform. They go beyond the basic security concepts that are already readily available to application developers to tackle essential and advanced topics such as attack countermeasures, the integration of Android within the enterprise, and the associated regulatory and compliance risks to an enterprise. By reading this book, anyone with an interest in mobile security will be able to get up to speed on the Android platform and will gain a strategic perspective on how to protect personal and enterprise customers from the growing threats to mobile devices. It is a must-have for security architects and consultants as well as enterprise security managers who are working with mobile devices and applications.
Dr. Dena Haritos Tsamitis
Director, Information Networking Institute (INI)
Director of Education, Training, and Outreach, CyLab
Carnegie Mellon University
Dr. Dena Haritos Tsamitis heads the Information Networking Institute (INI), a global, interdisciplinary department within Carnegie Mellon University’s College of Engineering. She oversees the INI’s graduate programs in information networking, information security technology and management, and information technology. Under her leader-ship, the INI expanded its programs to global locations and led the design of bicoastal programs in information security, mobility, and software management in collaboration.