Mobile and other handheld operating systems Books
HarperCollins Publishers Shinoy and the Chaos Crew The Day Tech Took Over
Book SynopsisCollins Big Cat supports every primary child on their reading journey from phonics to fluency. Top authors and illustrators have created fiction and non-fiction books that children love to read. Book banded for guided and independent reading, there are reading notes in the back, comprehensive teaching and assessment support and ebooks available.When Shinoy downloads the Chaos Crew app on his phone, a glitch in the system gives him the power to summon his TV heroes into his world. With the team on board, Shinoy can figure out what dastardly plans S.N.A.I.R. has come up with, and save the day.Location: Flat Hill School Shinoy's favourite place!Operative: Super tech wizard BugMission: There is no mission. Shiony's always been this bright. It's got nothing to do with his new watch.This exciting title is part of the Shinoy and the Chaos Crew series by Chris Callaghan.Gold/Band 9 books offer developing readers literary language and stories with distinctive characters.Ideas for reading in th
£9.49
John Wiley & Sons Inc Android Development with Flash
Book SynopsisThe visual guide to developing for one of the world s hottest new mobile platforms, the Android OS The Android operating system works on phones that combine a camera, Web browser, e-mail, GPS, and mapping tool into a single accessible pocket-sized unit, and can function on computers, as well.Table of ContentsHOW TO USE THIS VISUAL BLUEPRINT BOOK. 1 GETTING STARTED WITH ANDROID DEVELOPMENT. Introducing Android Devices. Introducing the Development Tools. Introducing the Available APIs. Check What APIs Are Not Available. Become an Android Developer. Get the Android SDK. Get the Android Eclipse Plug-in. Enable USB Debugging. Create an Android Virtual Device. Start the Emulator. 2 GETTING STARTED WITH FLASH CS5. Using the Actions Panel. Create a Skeleton Custom Class. Set the Source Path. Create MovieClips. Create Buttons. Edit Properties in Flash. Add Objects to the Stage with Code. Remove Objects from the Stage with Code. Work with Events. Using the Drawing API. Using Flash CS5 Help. 3 DEVELOPING YOUR FIRST APPLICATION. Create a New Project. Configure Publish Settings. Set Your Application Output. Create a P12 Certificate. Compile from Flash Professional CS5. Compile from the Command Line. Install Your Application on Your Device. Update Your Version Number. Set Application Permissions. Set a Custom Application URI. 4 DESIGNING YOUR APPLICATION. Mobile User Interface Guidelines. Understanding Screen Resolutions. Create Full-Screen Applications. Understanding Screen Orientation. Create Usable Hit States. Understanding Layout. 5 HANDLING INTERACTION. Create Button States. Respond to Touch Events. Track Multiple Touches. Respond to Zoom Events. Respond to Rotate Events. Respond to Pan Events. Respond to Swipe Events. Listen for Accelerometer Events. Determine If the Accelerometer Is Available. Determine Device Orientation. Detect Which Way Is Up. Filter Accelerometer Data. 6 WORKING WITH IMAGES. Prepare Your Images. Import Images. Display Images. Bundle Images with Your Application. Load Images at Runtime. Create Images Dynamically. Save Images to the Camera Roll. Select Images from the Camera Roll. Display the Camera. 7 WORKING WITH SOUND. Import Audio into Your Project. Choose an Audio Codec. Bundle Sounds with Your Application. Load Sounds at Runtime. Play Sounds. Stop Sounds. Set the Volume of a Sound. Visualize the Sound Spectrum. Access the Microphone. 8 WORKING WITH VIDEO. Explore Available Video Formats and Encode a Video File. Convert Videos. Embed a Video. Bundle a Video with Your Application. Load a Video. Buffer a Video. Control a Video. Set the Volume of a Video. 9 WORKING WITH TEXT. Embed Fonts in Your Application. Create an Input TextField. Create a Password TextField. Using TLF TextFields. Create a Scrollable TextField. 10 SAVING STATE. Create a Local SharedObject. Write to a SharedObject. Load Data from a SharedObject. Connect to a SQLite Database. Create a SQLite Table. Insert Data into a SQLite Table. Select Data from a SQLite Table. Update Data in a SQLite Table. Delete Data from a SQLite Table. Handle Application Exits. Save Application States. Handle Back and Menu Button Presses. Handle Application Deactivation. 11 WORKING WITH FILES. Reference Files and Directories. Write Files. Read Files. Update Files. Append Files. Handle Files Synchronously. Copy Files. Load SWF files. 12 USING THE LOCATION AND WIFI FEATURES. Retrieve Your Current Location. Map Your Location with Yahoo! Map Your Location with Google. Determine Your Speed. Check for an Internet Connection. Set the System Idle Mode. Display Web Pages. 13 USING SPECIAL URL PROTOCOLS. Make Phone Calls. Open the Mail Application. Open the Maps Application. Open the Messaging Application. Play a YouTube Video. 14 INTEGRATING WITH THIRD-PARTY SERVICES. Submit Updates to Twitter. Display Ads with Smaato. Track with Google Analytics. Display Ads with AdMob. 15 OPTIMIZING PERFORMANCE. Optimize Your Display List. Manage Mouse Events. Understanding cacheAsBitmap. Understanding cacheAsBitmapMatrix. 16 DEBUGGING YOUR APPLICATION. Show Your Trace Statements. Create Breakpoints. Using the Flash CS5 Debugger. Understanding the Debug Console. Understanding the Variables Panel. Debug with the Android Eclipse Plug-in. 17 DEPLOYING YOUR APPLICATION. Take Screenshots of Your Application on Your Device. Create an Application Icon. Publish Your Application for the Android Market. Upload Your Application to the Android Market. APPENDIX A ACTIONSCRIPT CLASS REFERENCE. INDEX.
£21.59
Bernard Babani Publishing An Introduction to the iPad with iOS10
Book Synopsis
£7.99
Bernard Babani Publishing An Introduction to th iPad with iOS12
Book Synopsis
£7.99
John Wiley & Sons Inc Android Hackers Handbook
Book SynopsisThe first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat.Table of ContentsIntroduction xxv Chapter 1 Looking at the Ecosystem 1 Understanding Android’s Roots 1 Company History 2 Version History 2 Examining the Device Pool 4 Open Source, Mostly 7 Understanding Android Stakeholders 7 Google 8 Hardware Vendors 10 Carriers 12 Developers 13 Users 14 Grasping Ecosystem Complexities 15 Fragmentation 16 Compatibility 17 Update Issues 18 Security versus Openness 21 Public Disclosures 22 Summary 23 Chapter 2 Android Security Design and Architecture 25 Understanding Android System Architecture 25 Understanding Security Boundaries and Enforcement 27 Android’s Sandbox 27 Android Permissions 30 Looking Closer at the Layers 34 Android Applications 34 The Android Framework 39 The Dalvik Virtual Machine 40 User-Space Native Code 41 The Kernel 49 Complex Security, Complex Exploits 55 Summary 56 Chapter 3 Rooting Your Device 57 Understanding the Partition Layout 58 Determining the Partition Layout 59 Understanding the Boot Process 60 Accessing Download Mode 61 Locked and Unlocked Boot Loaders 62 Stock and Custom Recovery Images 63 Rooting with an Unlocked Boot Loader 65 Rooting with a Locked Boot Loader 68 Gaining Root on a Booted System 69 NAND Locks, Temporary Root, and Permanent Root 70 Persisting a Soft Root 71 History of Known Attacks 73 Kernel: Wunderbar/asroot 73 Recovery: Volez 74 Udev: Exploid 74 Adbd: RageAgainstTheCage 75 Zygote: Zimperlich and Zysploit 75 Ashmem: KillingInTheNameOf and psneuter 76 Vold: GingerBreak 76 PowerVR: levitator 77 Libsysutils: zergRush 78 Kernel: mempodroid 78 File Permission and Symbolic Link–Related Attacks 79 Adb Restore Race Condition 79 Exynos4: exynos-abuse 80 Diag: lit / diaggetroot 81 Summary 81 Chapter 4 Reviewing Application Security 83 Common Issues 83 App Permission Issues 84 Insecure Transmission of Sensitive Data 86 Insecure Data Storage 87 Information Leakage Through Logs 88 Unsecured IPC Endpoints 89 Case Study: Mobile Security App 91 Profiling 91 Static Analysis 93 Dynamic Analysis 109 Attack 117 Case Study: SIP Client 120 Enter Drozer 121 Discovery 121 Snarfing 122 Injection 124 Summary 126 Chapter 5 Understanding Android’s Attack Surface 129 An Attack Terminology Primer 130 Attack Vectors 130 Attack Surfaces 131 Classifying Attack Surfaces 133 Surface Properties 133 Classification Decisions 134 Remote Attack Surfaces 134 Networking Concepts 134 Networking Stacks 139 Exposed Network Services 140 Mobile Technologies 142 Client-side Attack Surface 143 Google Infrastructure 148 Physical Adjacency 154 Wireless Communications 154 Other Technologies 161 Local Attack Surfaces 161 Exploring the File System 162 Finding Other Local Attack Surfaces 163 Physical Attack Surfaces 168 Dismantling Devices 169 USB 169 Other Physical Attack Surfaces 173 Third-Party Modifications 174 Summary 174 Chapter 6 Finding Vulnerabilities with Fuzz Testing 177 Fuzzing Background 177 Identifying a Target 179 Crafting Malformed Inputs 179 Processing Inputs 180 Monitoring Results 181 Fuzzing on Android 181 Fuzzing Broadcast Receivers 183 Identifying a Target 183 Generating Inputs 184 Delivering Inputs 185 Monitoring Testing 185 Fuzzing Chrome for Android 188 Selecting a Technology to Target 188 Generating Inputs 190 Processing Inputs 192 Monitoring Testing 194 Fuzzing the USB Attack Surface 197 USB Fuzzing Challenges 198 Selecting a Target Mode 198 Generating Inputs 199 Processing Inputs 201 Monitoring Testing 202 Summary 204 Chapter 7 Debugging and Analyzing Vulnerabilities 205 Getting All Available Information 205 Choosing a Toolchain 207 Debugging with Crash Dumps 208 System Logs 208 Tombstones 209 Remote Debugging 211 Debugging Dalvik Code 212 Debugging an Example App 213 Showing Framework Source Code 215 Debugging Existing Code 217 Debugging Native Code 221 Debugging with the NDK 222 Debugging with Eclipse 226 Debugging with AOSP 227 Increasing Automation 233 Debugging with Symbols 235 Debugging with a Non-AOSP Device 241 Debugging Mixed Code 243 Alternative Debugging Techniques 243 Debug Statements 243 On-Device Debugging 244 Dynamic Binary Instrumentation 245 Vulnerability Analysis 246 Determining Root Cause 246 Judging Exploitability 260 Summary 261 Chapter 8 Exploiting User Space Software 263 Memory Corruption Basics 263 Stack Buffer Overflows 264 Heap Exploitation 268 A History of Public Exploits 275 GingerBreak 275 zergRush 279 mempodroid 283 Exploiting the Android Browser 284 Understanding the Bug 284 Controlling the Heap 287 Summary 290 Chapter 9 Return Oriented Programming 291 History and Motivation 291 Separate Code and Instruction Cache 292 Basics of ROP on ARM 294 ARM Subroutine Calls 295 Combining Gadgets into a Chain 297 Identifying Potential Gadgets 299 Case Study: Android 4.0.1 Linker 300 Pivoting the Stack Pointer 301 Executing Arbitrary Code from a New Mapping 303 Summary 308 Chapter 10 Hacking and Attacking the Kernel 309 Android’s Linux Kernel 309 Extracting Kernels 310 Extracting from Stock Firmware 311 Extracting from Devices 314 Getting the Kernel from a Boot Image 315 Decompressing the Kernel 316 Running Custom Kernel Code 316 Obtaining Source Code 316 Setting Up a Build Environment 320 Configuring the Kernel 321 Using Custom Kernel Modules 322 Building a Custom Kernel 325 Creating a Boot Image 329 Booting a Custom Kernel 331 Debugging the Kernel 336 Obtaining Kernel Crash Reports 337 Understanding an Oops 338 Live Debugging with KGDB 343 Exploiting the Kernel 348 Typical Android Kernels 348 Extracting Addresses 350 Case Studies 352 Summary 364 Chapter 11 Attacking the Radio Interface Layer 367 Introduction to the RIL 368 RIL Architecture 368 Smartphone Architecture 369 The Android Telephony Stack 370 Telephony Stack Customization 371 The RIL Daemon (rild) 372 The Vendor-RIL API 374 Short Message Service (SMS) 375 Sending and Receiving SMS Messages 376 SMS Message Format 376 Interacting with the Modem 379 Emulating the Modem for Fuzzing 379 Fuzzing SMS on Android 382 Summary 390 Chapter 12 Exploit Mitigations 391 Classifying Mitigations 392 Code Signing 392 Hardening the Heap 394 Protecting Against Integer Overflows 394 Preventing Data Execution 396 Address Space Layout Randomization 398 Protecting the Stack 400 Format String Protections 401 Read-Only Relocations 403 Sandboxing 404 Fortifying Source Code 405 Access Control Mechanisms 407 Protecting the Kernel 408 Pointer and Log Restrictions 409 Protecting the Zero Page 410 Read-Only Memory Regions 410 Other Hardening Measures 411 Summary of Exploit Mitigations 414 Disabling Mitigation Features 415 Changing Your Personality 416 Altering Binaries 416 Tweaking the Kernel 417 Overcoming Exploit Mitigations 418 Overcoming Stack Protections 418 Overcoming ASLR 418 Overcoming Data Execution Protections 419 Overcoming Kernel Protections 419 Looking to the Future 420 Official Projects Underway 420 Community Kernel Hardening Efforts 420 A Bit of Speculation 422 Summary 422 Chapter 13 Hardware Attacks 423 Interfacing with Hardware Devices 424 UART Serial Interfaces 424 I2C, SPI, and One-Wire Interfaces 428 JTAG 431 Finding Debug Interfaces 443 Identifying Components 456 Getting Specifications 456 Difficulty Identifying Components 457 Intercepting, Monitoring, and Injecting Data 459 USB 459 I 2C, SPI, and UART Serial Interfaces 463 Stealing Secrets and Firmware 469 Accessing Firmware Unobtrusively 469 Destructively Accessing the Firmware 471 What Do You Do with a Dump? 474 Pitfalls 479 Custom Interfaces 479 Binary/Proprietary Data 479 Blown Debug Interfaces 480 Chip Passwords 480 Boot Loader Passwords, Hotkeys, and Silent Terminals 480 Customized Boot Sequences 481 Unexposed Address Lines 481 Anti-Reversing Epoxy 482 Image Encryption, Obfuscation, and Anti-Debugging 482 Summary 482 Appendix A Tool Catalog 485 Development Tools 485 Android SDK 485 Android NDK 486 Eclipse 486 ADT Plug-In 486 ADT Bundle 486 Android Studio 487 Firmware Extraction and Flashing Tools 487 Binwalk 487 fastboot 487 Samsung 488 NVIDIA 489 LG 489 HTC 489 Motorola 490 Native Android Tools 491 BusyBox 491 setpropex 491 SQLite 491 strace 492 Hooking and Instrumentation Tools 492 ADBI Framework 492 ldpreloadhook 492 XPosed Framework 492 Cydia Substrate 493 Static Analysis Tools 493 Smali and Baksmali 493 Androguard 493 apktool 494 dex2jar 494 jad 494 JD-GUI 495 JEB 495 Radare 2 495 IDA Pro and Hex-Rays Decompiler 496 Application Testing Tools 496 Drozer (Mercury) Framework 496 iSEC Intent Sniffer and Intent Fuzzer 496 Hardware Hacking Tools 496 Segger J-Link 497 JTAGulator 497 OpenOCD 497 Saleae 497 Bus Pirate 497 GoodFET 497 Total Phase Beagle USB 498 Facedancer 21 498 Total Phase Beagle I2c 498 Chip Quik 498 Hot air gun 498 Xeltek SuperPro 498 IDA 499 Appendix B Open Source Repositories 501 Google 501 AOSP 501 Gerrit Code Review 502 SoC Manufacturers 502 AllWinner 503 Intel 503 Marvell 503 MediaTek 504 Nvidia 504 Texas Instruments 504 Qualcomm 505 Samsung 505 OEMs 506 ASUS 506 HTC 507 LG 507 Motorola 507 Samsung 508 Sony Mobile 508 Upstream Sources 508 Others 509 Custom Firmware 509 Linaro 510 Replicant 510 Code Indexes 510 Individuals 510 Appendix C References 511 Index 523
£37.05
John Wiley & Sons Inc XDA Developers Android Hackers Toolkit
Book SynopsisMake your Android device truly your own Are you eager to make your Android device your own but you''re not sure where to start? Then this is the book for you. XDA is the world''s most popular resource for Android hacking enthusiasts, and a huge community has grown around customizing Android devices with XDA. XDA''s Android Hacker''s Toolkit gives you the tools you need to customize your devices by hacking or rooting the android operating system. Providing a solid understanding of the internal workings of the Android operating system, this book walks you through the terminology and functions of the android operating system from the major nodes of the file system to basic OS operations. As you learn the fundamentals of Android hacking that can be used regardless of any new releases, you''ll discover exciting ways to take complete control over your device. Teaches theory, preparation and practice, and understanding of the OS Explains the distTable of ContentsForeword xv Introduction 1 First Things First: What Is XDA? 1 The Dragons that Lie Ahead 3 Who This Book Is For 6 What This Book Covers 6 How This Book Is Structured 6 What You Need to Use This Book 7 Part I: What You Need to Know 9 Chapter 1: Android OS Internals: Understanding How Your Device Starts 11 The Penguin Down Below 12 How Your Android Device Starts 13 Bootstrapping 13 Adding a Custom Bootloader 15 Understanding the Bootloader Process 15 Custom Recoveries: The Holy Grail 17 Chapter 2: Rooting Your Android Device 21 Why Should You Root? 22 Increasing the Service Life of the Device 22 Fixing OEM Defects 23 Increasing Capability 24 Customizing the Device 25 Backing Up Data 26 Contact Information 26 Applications and Their Data 27 Data on the SD Card 27 How You Can Root and Leave Your OEM’s Control 28 OEM Flash Software 28 Exploits 30 Native Fastboot Flash 31 Scripted and One-Click Methods 31 Rooting Two Devices 32 Nexus One 32 HTC Thunderbolt 33 The Root of It All 34 Chapter 3: The Right Tool for the Job 37 Ready, Set, . . . Wait I Have to Have What? 38 Connecting a Phone to a Computer 38 Hacking Tools 38 USB Cables 39 USB Debugging 40 What’s Driving This Thing? 41 Using the Android Debug Bridge 42 Checking Device Connectivity 43 Restarting the ADB Service 44 Copying Files to and from Your Device 45 Rebooting a Device 48 The Power of Fastboot 49 Unlocking a Device 50 Updating a Device 50 Flashing a Device 50 Rebooting a Device 51 Harnessing the Power of the Penguin with ADB Shell 51 File System Navigation 52 File Management 54 File Access Permissions 57 Redirection and Piping 60 Concatenation 60 BusyBox: Giving the Penguin Back Its Power 61 The dd Command 61 The echo Command 62 The md5sum Command 62 Chapter 4: Rooting and Installing a Custom Recovery 63 How to Use Exploits 64 Exploit Scripts 64 Exploit Applications 65 Using a Script or Application on a Device 66 Hacking Utilities 68 OEM Tools 68 Developer Utilities 68 Image Files 68 Recovery Mode 69 What Is Recovery Mode? 69 Make It All So Easy: Get A Custom Recovery! 70 Using ClockworkMod Recovery 71 Rebooting the Device 72 Updating a Device from the SD Card 72 Resetting a Device to Factory Condition 74 Wiping the Cache 74 Installing a Zip File from the SD Card 74 Backing Up and Restoring a Device 76 Mounting Partitions and Managing Storage 79 Advanced Functions 79 Backup and Disaster Recovery 81 Precautions for Success and Data Recovery 82 Backing Up Applications 83 Backing Up Through a Recovery Process 83 Backing Up Through an Application 84 What Happens If It Goes Really Wrong? 84 Chapter 5: Theming: Digital Cosmetic Surgery 87 Changing the Look and Feel of Android 88 Theming the Launcher 89 Theming with an Add-on Launcher 89 Tools Used in Theming 89 APKManager 89 Android SDK 90 Eclipse 90 A ROM of Your Choice 91 7-Zip 91 Paint.NET 91 Update.zip Creator 91 Amend2Edify 92 The Editing Process 92 Walkthrough for Creating Theme Files 92 Walkthrough for Creating a Flashable ZIP File 97 Chapter 6: You’ve Become Superuser: Now What? 99 Popular Multi-Device Custom ROMs 100 CyanogenMod 100 Android Open Kang Project 101 VillainROM 101 Kernel Tweaks 101 Backlight Notifications 101 Voodoo Enhancements 102 Performance and Battery Life Tweaks 103 Root Applications 103 SetCPU 103 Adfree Android 104 Chainfire 3D 104 Titanium Backup 105 Part II: Manufacturer Guidelines and Device-specific Guides 107 Chapter 7: HTC EVO 3D: A Locked Device 109 Obtaining Temporary Root 110 Using S-OFF and Permanent Root Requirements 111 Running the Revolutionary Tool 112 Installing a Custom Recovery 115 Installing the Superuser Binary 116 Installing a SuperUser Application 117 Chapter 8: Nexus One: An Unlockable Device 119 Root Methods Available 120 Resources Required for This Walkthrough 120 Walkthrough 121 Placing the Nexus One in Fastboot Mode 122 Flashing a Boot Partition 123 Getting Full Root Access 124 Installing a Custom Recovery 125 Chapter 9: HTC ThunderBolt: A Tightly Locked Device 127 Root Methods Available 128 Resources Required for This Walkthrough 128 Walkthrough 129 Pushing Files to the Device 129 Gaining Temporary Root 130 Checking a File’s MD5 Signature 131 Writing the Temporary Bootloader 131 Downgrading the Firmware 132 Gaining Temporary Root to Unlock the mmc 133 Rewriting the Bootloader 134 Upgrading the Firmware 135 Chapter 10: Droid Charge: Flashing with ODIN 137 Resources Required for This Walkthrough 138 Walkthrough 138 Connecting the Device to ODIN 138 Flashing the Device 139 Troubleshooting 140 Chapter 11: Nexus S: An Unlocked Device 143 Connecting the Device to a PC 144 Resources Required for This Walkthrough 144 Walkthrough 144 Unlocking the Device 144 Flashing the Device with a Recovery 145 Flashing the Device with the SuperUser Application 146 Chapter 12: Motorola Xoom: An Unlocked Honeycomb Tablet 147 Resources Required for This Walkthrough 148 Walkthrough 148 Pushing the Root File to the SD Card 148 Unlocking the Xoom 148 Flashing the Device with a Recovery 149 Flashing the Device with a Universal Root 150 Chapter 13: Nook Color: Rooting with a Bootable SD Card 153 Resources Required for This Walkthrough 154 Walkthrough 154 Creating a Bootable SD Card 155 Booting the Device from the SD Card 155 Making the Device More Usable 156 Appendix A: Setting Up Android SDK and ADB Tools 159 Installing the Java Development Kit 160 Installing the Android SDK 161 Installing the Platform Tools 162 Setting Up Windows Environment Variables 163 Index 165
£18.39
Quickstudy Reference Guides iPhone iPad IOS 15
Book Synopsis
£6.95
Barcharts, Inc iPhone iPad IOS 16
Book Synopsis
£7.55
O'Reilly Media iOS Sensor Apps with Arduino
Book SynopsisThis book looks at how to integrate iOS devices into distributed sensors network, both to make use of its own on-board sensors in such networks, but also as a hub.
£13.59
O'Reilly Media Learning the iOS 4 SDK for JavaScript Programmers
Book SynopsisIs it possible for JavaScript programmers to learn the iPhone SDK and live to tell the tale? Technology guru Danny Goodman did, and in this book he leaves a well-marked trail for you to follow. Goodman knows the challenges you face with the SDK, so he introduces Objective-C and Cocoa Touch in a context you'll understand.
£20.99
SL Editions A Senior's Guide to iPhone Photography: Shooting
Book Synopsis
£13.49
Pragmatic Programmers Hotwire Native for Rails Developers
Book Synopsis
£37.04