Android Application Secure Design/Secure Coding Guidebook

67
回复
5166
查看
[复制链接]

54

主题

97

帖子

2049

安币

Android大神

Rank: 6Rank: 6

发表于 2015-5-18 17:56:46 | 显示全部楼层 |阅读模式


android代码开发中你需要知道的安全知识,必读之作。
1. Introduction ................................................................................................................................ 9
1.1. Building a Secure Smartphone Society ................................................................................... 9
1.2. Timely Feedback on a Regular Basis Through the Beta Version ............................................. 10
1.3. Usage Agreement of the Guidebook .................................................................................... 11
1.4. Correction articles of April 1 2014 edtion ............................................................................ 12
2. Composition of the Guidebook .................................................................................................. 14
2.1. Developer's Context ............................................................................................................ 14
2.2. Sample Code, Rule Book, Advanced Topics .......................................................................... 15
2.3. The Scope of the Guidebook ............................................................................................... 18
2.4. Literature on Android Secure Coding ................................................................................... 19
2.5. Steps to Install Sample Codes into Eclipse ........................................................................... 20
3. Basic Knowledge of Secure Design and Secure Coding ............................................................... 36
3.1. Android Application Security ............................................................................................... 36
3.2. Handling Input Data Carefully and Securely ......................................................................... 49
4. Using Technology in a Safe Way ................................................................................................. 51
4.1. Creating/Using Activities .................................................................................................... 51
4.2. Receiving/Sending Broadcasts ............................................................................................. 96
4.3. Creating/Using Content Providers ..................................................................................... 129
4.4. Creating/Using Services .................................................................................................... 179
4.5. Using SQLite ..................................................................................................................... 223
4.6. Handling Files ................................................................................................................... 241
4.7. Using Browsable Intent ...................................................................................................... 268
4.8. Outputting Log to LogCat .................................................................................................. 272
4.9. Using WebView ................................................................................................................. 284
5. How to use Security Functions ................................................................................................. 295
5.1. Creating Password Input Screens ....................................................................................... 295
5.2. Permission and Protection Level ........................................................................................ 310
5.3. Add In-house Accounts to Account Manager ..................................................................... 338
5.4. Communicating via HTTPS ................................................................................................ 357
5.5. Handling privacy data ....................................................................................................... 379
5.6. Using Cryptography .......................................................................................................... 412
6. Difficult Problems ................................................................................................................... 441
6.1. Risk of Information Leakage from Clipboard ...................................................................... 441

PDF下载:
游客,如果您要查看本帖隐藏内容请回复


本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?立即注册

x

0

主题

17

帖子

17

安币

初级码农

Rank: 1

发表于 2015-5-18 20:03:08 | 显示全部楼层
xuexi kankan

0

主题

0

帖子

-4

安币

限制会员

发表于 2015-5-18 20:07:32 | 显示全部楼层
顶一个了

0

主题

0

帖子

-11

安币

限制会员

发表于 2015-5-18 20:11:55 | 显示全部楼层
藕是来打酱油滴...

0

主题

6

帖子

50

安币

程序猿

Rank: 2

QQ达人

发表于 2015-5-18 21:38:49 | 显示全部楼层
怎么不能下载啊

0

主题

0

帖子

0

安币

初级码农

Rank: 1

发表于 2015-5-18 22:28:48 | 显示全部楼层
顶一个藕是来打酱油滴...

0

主题

28

帖子

59

安币

程序猿

Rank: 2

QQ达人

发表于 2015-5-18 22:55:41 | 显示全部楼层
666666666666666666

0

主题

0

帖子

-6

安币

限制会员

发表于 2015-5-18 23:18:03 | 显示全部楼层
不错哦  喜欢 嘿嘿
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

领先的中文移动开发者社区
18620764416
7*24全天服务
意见反馈:1294855032@qq.com

扫一扫关注我们

Powered by Discuz! X3.2© 2001-2019 Comsenz Inc.( 粤ICP备15117877号 )