Concepts in Action — Part 1

  • Sheran Gunasekera


In this chapter, we will merge together all the topics we discussed in the previous chapters. If you recall, we discussed the Proxim application, through which we looked at data encryption. We will analyze its source code in detail here. We will also work through some examples of applications that require and use permissions.


Data Encryption Previous Chapter Application Permission Android Application Location Location 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Sheran Gunasekera 2012

Authors and Affiliations

  • Sheran Gunasekera

There are no affiliations available

Personalised recommendations