Vendor Profile
Shoeisha Co., Ltd.
| Address | 5 Funamachi Shinjuku-ku Tokyo, JAPAN ZIP:160-0006 |
|---|---|
| Representative Name | Kaoru Usui |
| Annual Revenue | closed |
| No. of Employees | 185 |
| Web Site URL |
SD item code:14048628
| Detail | Price & Quantity | ||
|---|---|---|---|
| S1 |
Tatsuya Konishi (Author)
小西 達也 (著)
(184850)
JAN:9784798184852
|
(184850)
JAN:9784798184852
Wholesale Price: Members Only
1 pc /set
In Stock
|
|
| Shipping Date |
|---|
|
About 1 week
|
| Dimensions |
|---|
|
Format: B5 size
Number of pages:304 |
| Specifications |
|---|
|
Country of manufacture: Japan
Material / component: Format:Book (paper)
Year of manufacture: 2025
Product tag: None
|
Description
| Creating Vulnerability-Resistant Apps. A Practical Introduction to Security for Android App Developers! *Is mobile app security hard to learn? Now that smartphones have become a part of our lives, mobile apps are constantly at risk of attack. Security measures are essential requirements for developers to protect users' information. On the other hand, many people may have a hard time trying to learn the security knowledge required for Android app development. The reality is that official documents and various guidelines are scattered all over the place, making it difficult to grasp [how to apply them to actual development]. *Features of this book This book is an introductory guide that systematically explains in a hands-on format the basics of security that Android application developers need to know at a minimum, as well as countermeasures that can be implemented immediately. The author, who has dealt with security issues on a daily basis, has carefully and practically compiled know-how that is truly useful in the field of development. For example, the following topics related to security [only for mobile devices] are concretely explained with code examples. *Configuring manifest files properly *Validating input values in intents *Cautions for handling sensitive information *Perfect implementation of WebView *Proper configuration of networks and certificates The course is structured so that participants can understand the mechanism of each risk and possible attack methods, and then actually run the vulnerable code to realize the importance and effectiveness of the countermeasures. *The hands-on sessions in this book can be performed on either Windows or Mac OS. In addition, the sample apps are started* and operated on the Android Studio emulator, so there is no need to prepare an actual device. *Target audience for this book *Android application developers (2-3 years of experience) *Anyone interested in mobile app security *Anyone who has read the security guidelines but did not get the point. |
More
| Shipping Method | Estimated Arrival |
|---|---|
| Sea Mail | From Jan.1st 2026 to Mar.5th 2026 |
| Air Mail | From Dec.16th 2025 to Dec.18th 2025 |
| EMS | From Dec.15th 2025 to Dec.18th 2025 |
| Pantos Express | From Dec.17th 2025 to Dec.22nd 2025 |
| DHL | From Dec.15th 2025 to Dec.17th 2025 |
| UPS | From Dec.15th 2025 to Dec.17th 2025 |
| FedEx | From Dec.15th 2025 to Dec.17th 2025 |
|
Some trading conditions may be applicable only in Japan.
This product (book) is subject to the Resale Price Maintenance Program. The law allows the manufacturer (publisher) to specify the sales price. We ask that your company also adhere to the resale price specified by us. In the unlikely event that you fail to do so, we may terminate the transaction. Thank you very much for your understanding and cooperation.
|
Other items from this category:
A Practical Introduction to Security for Android App Developers!
*Is mobile app security hard to learn?
Now that smartphones have become a part of our lives, mobile apps are constantly at risk of attack. Security measures are essential requirements for developers to protect users' information.
On the other hand, many people may have a hard time trying to learn the security knowledge required for Android app development. The reality is that official documents and various guidelines are scattered all over the place, making it difficult to grasp [how to apply them to actual development].
*Features of this book
This book is an introductory guide that systematically explains in a hands-on format the basics of security that Android application developers need to know at a minimum, as well as countermeasures that can be implemented immediately. The author, who has dealt with security issues on a daily basis, has carefully and practically compiled know-how that is truly useful in the field of development.
For example, the following topics related to security [only for mobile devices] are concretely explained with code examples.
*Configuring manifest files properly
*Validating input values in intents
*Cautions for handling sensitive information
*Perfect implementation of WebView
*Proper configuration of networks and certificates
The course is structured so that participants can understand the mechanism of each risk and possible attack methods, and then actually run the vulnerable code to realize the importance and effectiveness of the countermeasures.
*The hands-on sessions in this book can be performed on either Windows or Mac OS. In addition, the sample apps are started* and operated on the Android Studio emulator, so there is no need to prepare an actual device.
*Target audience for this book
*Android application developers (2-3 years of experience)
*Anyone interested in mobile app security
*Anyone who has read the security guidelines but did not get the point.