Abstract
In this chapter, we will merge together all the topics we discussed in the previous chapters. If you recall, we discussed the Proxim application, through which we looked at data encryption. We will analyze its source code in detail here. We will also work through some examples of applications that require and use permissions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2012 Sheran Gunasekera
About this chapter
Cite this chapter
Gunasekera, S. (2012). Concepts in Action — Part 1. In: Android Apps Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-4063-1_4
Download citation
DOI: https://doi.org/10.1007/978-1-4302-4063-1_4
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-4062-4
Online ISBN: 978-1-4302-4063-1
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)