SlideShare a Scribd company logo
16 Ways to Create
a Secure Android Application
The security functionality provided
by the Android platform is rich, and
strong security mechanisms can be
created using built-in features.
Here is a list of checks that
you can use to assess the
security of your application.
Check that all
code paths into
application
components
expose only the
functionality
that is intended
Minimize the
storage of user
data down to
the essentials
Limit interaction
with untrusted
sources
and scrutinize
any outside
interaction
Verify that
the minimum
possible set
of permissions
have been
requested by
the application
Ensure that no
unintended files
are bundled
inside the APK
Assign
permissions
to all exported
application
components
Ensure that
sensitive inputs
do not store any
typed-in words
into the Android
dictionary
Ensure that all
inputs for user
passwords are
appropriately
masked
Ensure that
content providers
do not have SQL
injection
vulnerabilities
Ensure that file-
backed content
providers do not
provide access to
unintended files
Ensure that
pattern-matching
flaws do not
exist on any
paths protected
by permissions
Set restrictive
file permissions
on files stored
inside the private
data directory
Pay attention
to the sensitivity
of files stored on
the SD card
Ensure that
sensitive files
stored anywhere
on the filesystem
are encrypted
Encrypt all
communications
to the Internet
using well-known
standards
The Mobile
Application
Hacker’s
Handbook
by Dominic Chell,
Tyrone Erasmus,
Shaun Colley, and
Ollie Whitehouse
THESE ARE JUST SOME OF THE WAYS DEVELOPERS CAN ENSURE
THEIR ANDROID APPLICATIONS ARE SECURE.
FOR THE FULL LIST, CHECK OUT

More Related Content

What's hot

Android pen test basics
Android pen test basicsAndroid pen test basics
Android pen test basics
OWASPKerala
 
Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]
Angelo Rüggeberg
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development
Cheng-Yi Yu
 
Decompiling Android Workshop
Decompiling Android WorkshopDecompiling Android Workshop
Decompiling Android Workshop
Godfrey Nolan
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Software Integrity Group
 
Security in iOS
Security in iOSSecurity in iOS
Security in iOS
Clement Prem
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Aishwary Sinha
 
CNIT 128 6. Analyzing Android Applications (Part 3)
CNIT 128 6. Analyzing Android Applications (Part 3)CNIT 128 6. Analyzing Android Applications (Part 3)
CNIT 128 6. Analyzing Android Applications (Part 3)
Sam Bowne
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesUnderstanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Anant Shrivastava
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
Minali Arora
 
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comOWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
SV Ruby on Rails Meetup
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Prathan Phongthiproek
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
Ajin Abraham
 
6. Analyzing Android Applications Part 2
6. Analyzing Android Applications Part 26. Analyzing Android Applications Part 2
6. Analyzing Android Applications Part 2
Sam Bowne
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
Subho Halder
 
Wirelurker
WirelurkerWirelurker
Wirelurker
anupriti
 
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - Whitepaper
Ajin Abraham
 
Abusing Google Apps and Data API: Google is My Command and Control Center
Abusing Google Apps and Data API: Google is My Command and Control CenterAbusing Google Apps and Data API: Google is My Command and Control Center
Abusing Google Apps and Data API: Google is My Command and Control Center
Ajin Abraham
 
Humla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null SingaporeHumla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null Singapore
n|u - The Open Security Community
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
ClubHack
 

What's hot (20)

Android pen test basics
Android pen test basicsAndroid pen test basics
Android pen test basics
 
Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]Hacking Android [MUC:SEC 20.05.2015]
Hacking Android [MUC:SEC 20.05.2015]
 
2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development 2015.04.24 Updated > Android Security Development - Part 1: App Development
2015.04.24 Updated > Android Security Development - Part 1: App Development
 
Decompiling Android Workshop
Decompiling Android WorkshopDecompiling Android Workshop
Decompiling Android Workshop
 
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
Synopsys Security Event Israel Presentation: New AppSec Paradigms with Open S...
 
Security in iOS
Security in iOSSecurity in iOS
Security in iOS
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
CNIT 128 6. Analyzing Android Applications (Part 3)
CNIT 128 6. Analyzing Android Applications (Part 3)CNIT 128 6. Analyzing Android Applications (Part 3)
CNIT 128 6. Analyzing Android Applications (Part 3)
 
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known VulnerabilitiesUnderstanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
 
Getting started with Android pentesting
Getting started with Android pentestingGetting started with Android pentesting
Getting started with Android pentesting
 
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.comOWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
OWASP Top 10 and Securing Rails - Sean Todd - PayNearMe.com
 
Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]Mobile Application Pentest [Fast-Track]
Mobile Application Pentest [Fast-Track]
 
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSFAppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
AppSec EU 2016: Automated Mobile Application Security Assessment with MobSF
 
6. Analyzing Android Applications Part 2
6. Analyzing Android Applications Part 26. Analyzing Android Applications Part 2
6. Analyzing Android Applications Part 2
 
Android Security & Penetration Testing
Android Security & Penetration TestingAndroid Security & Penetration Testing
Android Security & Penetration Testing
 
Wirelurker
WirelurkerWirelurker
Wirelurker
 
Hacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - WhitepaperHacking Tizen: The OS of everything - Whitepaper
Hacking Tizen: The OS of everything - Whitepaper
 
Abusing Google Apps and Data API: Google is My Command and Control Center
Abusing Google Apps and Data API: Google is My Command and Control CenterAbusing Google Apps and Data API: Google is My Command and Control Center
Abusing Google Apps and Data API: Google is My Command and Control Center
 
Humla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null SingaporeHumla workshop on Android Security Testing - null Singapore
Humla workshop on Android Security Testing - null Singapore
 
Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)Pentesting Mobile Applications (Prashant Verma)
Pentesting Mobile Applications (Prashant Verma)
 

Viewers also liked

Tugas2 matematika3 bab2
Tugas2 matematika3 bab2Tugas2 matematika3 bab2
Tugas2 matematika3 bab2
ramadhani_817
 
Mobile Banking, Financial Inclusion and PNG's Resources Sector Final 2015-05-29
Mobile Banking, Financial Inclusion and PNG's Resources Sector Final 2015-05-29Mobile Banking, Financial Inclusion and PNG's Resources Sector Final 2015-05-29
Mobile Banking, Financial Inclusion and PNG's Resources Sector Final 2015-05-29Dr Tim Grice
 
Asean Economic Community
Asean Economic CommunityAsean Economic Community
Asean Economic Community
Wahab Jumrah
 
Bài tập tài chính quốc tế
Bài tập tài chính quốc tếBài tập tài chính quốc tế
Bài tập tài chính quốc tế
Nguyễn Ngọc Phan Văn
 
Bao cao nghien_cuu_thi_truong_dien_may_truc_tuyen_2013
Bao cao nghien_cuu_thi_truong_dien_may_truc_tuyen_2013Bao cao nghien_cuu_thi_truong_dien_may_truc_tuyen_2013
Bao cao nghien_cuu_thi_truong_dien_may_truc_tuyen_2013
Anna Nguyen
 

Viewers also liked (7)

Tugas2 matematika3 bab2
Tugas2 matematika3 bab2Tugas2 matematika3 bab2
Tugas2 matematika3 bab2
 
my resume
my resumemy resume
my resume
 
Mobile Banking, Financial Inclusion and PNG's Resources Sector Final 2015-05-29
Mobile Banking, Financial Inclusion and PNG's Resources Sector Final 2015-05-29Mobile Banking, Financial Inclusion and PNG's Resources Sector Final 2015-05-29
Mobile Banking, Financial Inclusion and PNG's Resources Sector Final 2015-05-29
 
SIP REPORT tata
SIP REPORT tataSIP REPORT tata
SIP REPORT tata
 
Asean Economic Community
Asean Economic CommunityAsean Economic Community
Asean Economic Community
 
Bài tập tài chính quốc tế
Bài tập tài chính quốc tếBài tập tài chính quốc tế
Bài tập tài chính quốc tế
 
Bao cao nghien_cuu_thi_truong_dien_may_truc_tuyen_2013
Bao cao nghien_cuu_thi_truong_dien_may_truc_tuyen_2013Bao cao nghien_cuu_thi_truong_dien_may_truc_tuyen_2013
Bao cao nghien_cuu_thi_truong_dien_may_truc_tuyen_2013
 

Similar to 16 Ways to Create a Secure Android Application

Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applicationsGTestClub
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
Asanka Dilruk
 
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdfWhat is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
Cyber security professional services- Detox techno
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
Vandana Verma
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
Appknox
 
OWASP for iOS
OWASP for iOSOWASP for iOS
OWASP for iOS
Phineas Huang
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
Pragati Rai
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on androidRavishankar Kumar
 
Android Overview
Android OverviewAndroid Overview
Android Overview
Raju Kadam
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
nullowaspmumbai
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
ICS
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the HackersCheckmarx
 
Top 6 Android Security Best Practices for App Development
Top 6 Android Security Best Practices for App DevelopmentTop 6 Android Security Best Practices for App Development
Top 6 Android Security Best Practices for App Development
Creative Encode technologies pvt. ltd.
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
Cybersecurity Education and Research Centre
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practices
Potato
 
Application Security Vulnerabilities: OWASP Top 10 -2007
Application Security Vulnerabilities: OWASP Top 10  -2007Application Security Vulnerabilities: OWASP Top 10  -2007
Application Security Vulnerabilities: OWASP Top 10 -2007
Vaibhav Gupta
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017
Satheesh Kumar V
 
Mobile App Security - Best Practices
Mobile App Security - Best PracticesMobile App Security - Best Practices
Mobile App Security - Best Practices
RedBlackTree
 
Android training in chandigarh
Android training in chandigarhAndroid training in chandigarh
Android training in chandigarh
Sheetal Sharma
 

Similar to 16 Ways to Create a Secure Android Application (20)

Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Understanding Android Security
Understanding Android SecurityUnderstanding Android Security
Understanding Android Security
 
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdfWhat is Android app Pentesting in 2022- DetoxTechnologies.pdf
What is Android app Pentesting in 2022- DetoxTechnologies.pdf
 
Getting started with android
Getting started with androidGetting started with android
Getting started with android
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
 
OWASP for iOS
OWASP for iOSOWASP for iOS
OWASP for iOS
 
Understanding android security model
Understanding android security modelUnderstanding android security model
Understanding android security model
 
Analysis and research of system security based on android
Analysis and research of system security based on androidAnalysis and research of system security based on android
Analysis and research of system security based on android
 
Android Overview
Android OverviewAndroid Overview
Android Overview
 
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat DasNull Mumbai Meet_Android Reverse Engineering by Samrat Das
Null Mumbai Meet_Android Reverse Engineering by Samrat Das
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers10 Tips to Keep Your Software a Step Ahead of the Hackers
10 Tips to Keep Your Software a Step Ahead of the Hackers
 
Top 6 Android Security Best Practices for App Development
Top 6 Android Security Best Practices for App DevelopmentTop 6 Android Security Best Practices for App Development
Top 6 Android Security Best Practices for App Development
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Web appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practicesWeb appsec and it’s 10 best SDLC practices
Web appsec and it’s 10 best SDLC practices
 
Application Security Vulnerabilities: OWASP Top 10 -2007
Application Security Vulnerabilities: OWASP Top 10  -2007Application Security Vulnerabilities: OWASP Top 10  -2007
Application Security Vulnerabilities: OWASP Top 10 -2007
 
Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017Introduction to Android Application Security Testing - 2nd Sep 2017
Introduction to Android Application Security Testing - 2nd Sep 2017
 
Mobile App Security - Best Practices
Mobile App Security - Best PracticesMobile App Security - Best Practices
Mobile App Security - Best Practices
 
Android training in chandigarh
Android training in chandigarhAndroid training in chandigarh
Android training in chandigarh
 

More from Wiley

Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019
Wiley
 
19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon
Wiley
 
3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back
Wiley
 
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
Wiley
 
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
Wiley
 
A Celebration of Women's History Month
A Celebration of Women's History MonthA Celebration of Women's History Month
A Celebration of Women's History Month
Wiley
 
Leadership Is for Everyone
Leadership Is for EveryoneLeadership Is for Everyone
Leadership Is for Everyone
Wiley
 
The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales Success
Wiley
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives
Wiley
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful Facts
Wiley
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?
Wiley
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in Research
Wiley
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a Difference
Wiley
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WELWiley
 
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...Wiley
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to Cheating
Wiley
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With Gaps
Wiley
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the Classroom
Wiley
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum Updates
Wiley
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills
Wiley
 

More from Wiley (20)

Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019Publisher as Strategic Partner for Societies October 2019
Publisher as Strategic Partner for Societies October 2019
 
19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon19 Inspiring Books by Jon Gordon
19 Inspiring Books by Jon Gordon
 
3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back3 Big Myths That Hold Women Back
3 Big Myths That Hold Women Back
 
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
The 5 Types of Meetings Project Managers Need to Master-Slide Deck Number Thr...
 
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
The 5 Types of Meetings Project Managers Need to Master - Slide Deck Number T...
 
A Celebration of Women's History Month
A Celebration of Women's History MonthA Celebration of Women's History Month
A Celebration of Women's History Month
 
Leadership Is for Everyone
Leadership Is for EveryoneLeadership Is for Everyone
Leadership Is for Everyone
 
The Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales SuccessThe Five Leadership Practices that Improve Sales Success
The Five Leadership Practices that Improve Sales Success
 
7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives7 Steps to Develop Well-Designed Course Objectives
7 Steps to Develop Well-Designed Course Objectives
 
Today's Students: 7 Powerful Facts
Today's Students: 7 Powerful FactsToday's Students: 7 Powerful Facts
Today's Students: 7 Powerful Facts
 
Should you get an MBA?
Should you get an MBA?Should you get an MBA?
Should you get an MBA?
 
Valuing International Collaboration in Research
Valuing International Collaboration in ResearchValuing International Collaboration in Research
Valuing International Collaboration in Research
 
Leadership Makes a Difference
Leadership Makes a DifferenceLeadership Makes a Difference
Leadership Makes a Difference
 
5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL5 Reasons to Earn Your CPA License WEL
5 Reasons to Earn Your CPA License WEL
 
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
From DBA to EBA: A Five-year Story from a Consortium Shared E-Book Collection...
 
An Educator's Guide to Cheating
An Educator's Guide to CheatingAn Educator's Guide to Cheating
An Educator's Guide to Cheating
 
Mine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With GapsMine the Gap: Using Handouts With Gaps
Mine the Gap: Using Handouts With Gaps
 
Get Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the ClassroomGet Your Students Motivated: Tips for the Classroom
Get Your Students Motivated: Tips for the Classroom
 
Level I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum UpdatesLevel I CFA Exam 2017 Curriculum Updates
Level I CFA Exam 2017 Curriculum Updates
 
6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills6 Steps to Hire Someone with Soft Skills
6 Steps to Hire Someone with Soft Skills
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

16 Ways to Create a Secure Android Application