Solutions Review compiles the most essential books on Android that any IT administrator or developer needs to add to their reading list.
Knowing how to properly manage and secure your Android devices is critical for IT administrators and engineers. Books, whether hardcover or digital, are an excellent source for people looking to learn about a specific field of technology, and Android is no exception. We’ve listed the top Android books that you should add to your reading list. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in Android devices and management.
Looking for more information on mobile security and mobility management vendors? Our free Buyer’s Guide contains profiles on the top vendors in the mobility management field and their key features and functions. It also lists questions you should ask yourself and prospective vendors before you choose a solution.
“Using innovative, engaging methods, Android App Development cultivates student knowledge of app development through a progressive, building block approach. […] Model View Controller architecture is used throughout the book to promote good software engineering practice. Students will be engaged by essential as well as specialized topics such as XML resources, event-driven programming, animation, sounds, making a game, voice recognition, and more.”
“Jump in and build working Android apps with the help of more than 230 tested recipes. The second edition of this acclaimed cookbook includes recipes for working with user interfaces, multitouch gestures, location awareness, web services, and specific device features such as the phone, camera, and accelerometer. You also get useful info on packaging your app for the Google Play Market.”
“Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, and forensic acquisition techniques and strategies for the subsequent analysis required.”
“[This book] is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics of the Android platform and its security issues. Explaining the Android security model and architecture, the book describes Android permissions, including Manifest permissions, to help readers analyze applications and understand permission requirements. It also rates the Android permissions based on security implications and covers JEB Decompiler.”
“There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system.”
“Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. […] This is becoming an increasingly important topic as the Android marketplace grows and developers are unwittingly releasing the apps with lots of back doors allowing people to potentially obtain credit card information and database logins to back-end systems, as they don’t realize how easy it is to decompile their Android code.”
“Professional Android, 4th Edition shows developers how to leverage the latest features of Android to create robust and compelling mobile apps. This hands-on approach provides in-depth coverage through a series of projects, each introducing a new Android platform feature and highlighting the techniques and best practices that exploit its utmost functionality. The exercises begin simply, and gradually build into advanced Android development.”
Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.
Looking for more info on the benefits of mobility management? You should check out our free Mobility Management Buyer’s Guide. We profile the top vendors in the mobility management field, list their key capabilities, and determine our Bottom Line for each.
Check us out on Twitter for the latest in Enterprise Mobility news and developments!
- The Best Mobile Security Courses on Coursera - September 16, 2021
- Analyzing the Niche Players in Unified Endpoint Management, 2021 - August 31, 2021
- What’s Changed: 2021 Gartner Magic Quadrant for Unified Endpoint Management - August 24, 2021