Index

Note: Page numbers followed by b indicate boxes, f indicate figures, t indicate tables and np indicate footnotes.

A

Access control 411
Account hijacking 
defenses 70–71
impacts 71
risk rating 71, 73t
source 70
targets 71
vectors 70
vulnerabilities 70
AccountManager class 300–301
Account/service hijacking 415
Action phase 389, 393–394
Amazon Elastic Compute Cloud (Amazon EC2) 47, 49, 70
Amazon Web Services 350
American Institute of CPAs® (AICPA) 458
Android Debug Bridge (ADB) 288
Android devices 
ADB 288
analysis methodology  See (Evidence collection)
AndroidManifest.xml file 286
app access and secret keys 289
digital forensics 285, 288
evidentiary data 289
Linux-specific security features 286
location information 288–289
mobile device  ...

Get The Cloud Security Ecosystem now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.