Submit Search
Upload
Android Workshop Day 3
•
Download as ODP, PDF
•
0 likes
•
495 views
Senad Uka
Follow
Android Workshop Day 3 Business Logic
Read less
Read more
Software
Technology
Business
Report
Share
Report
Share
1 of 14
Download now
Recommended
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)
Nagarro
Ruby to the Rescue!
Ruby to the Rescue!
Senad Uka
Unpoly - Progressive enhancement framework
Unpoly - Progressive enhancement framework
Senad Uka
Android Workshop Day 1
Android Workshop Day 1
Senad Uka
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
Introduction to Android Development and Security
Introduction to Android Development and Security
Kelwin Yang
Man-In-The-Disk
Man-In-The-Disk
Priyanka Aash
10 ways to improve your Android app performance
10 ways to improve your Android app performance
Boris Farber
Recommended
Are Your Mobile Apps Secure? (Part I)
Are Your Mobile Apps Secure? (Part I)
Nagarro
Ruby to the Rescue!
Ruby to the Rescue!
Senad Uka
Unpoly - Progressive enhancement framework
Unpoly - Progressive enhancement framework
Senad Uka
Android Workshop Day 1
Android Workshop Day 1
Senad Uka
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Anant Shrivastava
Introduction to Android Development and Security
Introduction to Android Development and Security
Kelwin Yang
Man-In-The-Disk
Man-In-The-Disk
Priyanka Aash
10 ways to improve your Android app performance
10 ways to improve your Android app performance
Boris Farber
Pertemuan 13 - Shared Preferences and Settings - Word - Salin.pdf
Pertemuan 13 - Shared Preferences and Settings - Word - Salin.pdf
HendroGunawan8
Android developer fundamentals training overview Part II
Android developer fundamentals training overview Part II
Yoza Aprilio
CISSP Week 13
CISSP Week 13
jemtallon
Windows Phone 8 application security
Windows Phone 8 application security
Andrey Chasovskikh
Windows Security Crash Course
Windows Security Crash Course
UTD Computer Security Group
Anil saldhana securityassurancewithj_bosseap
Anil saldhana securityassurancewithj_bosseap
Anil Saldanha
Securing Startups
Securing Startups
Omaid Faizyar
My first Operating System Presentation
My first Operating System Presentation
Rida Bilgrami
The Ultimate Android Security Checklist (AnDevCon Boston 2014)
The Ultimate Android Security Checklist (AnDevCon Boston 2014)
Ron Munitz
Looking for Vulnerable Code. Vlad Savitsky
Looking for Vulnerable Code. Vlad Savitsky
Vlad Savitsky
JS patterns
JS patterns
Łukasz Wójcik
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Codemotion
Android Security and Peneteration Testing
Android Security and Peneteration Testing
Surabaya Blackhat
cf.Objective() 2017 - Design patterns - Brad Wood
cf.Objective() 2017 - Design patterns - Brad Wood
Ortus Solutions, Corp
The Ultimate Android Security Checklist (Mdevcon 2014)
The Ultimate Android Security Checklist (Mdevcon 2014)
Ron Munitz
EDI_MID_SEMESTER[1].pptx
EDI_MID_SEMESTER[1].pptx
YashGarale1
Cloud Security with LibVMI
Cloud Security with LibVMI
Tamas K Lengyel
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
Ron Munitz
Security Research
Security Research
AGILE IoT
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Dr. Anish Cheriyan (PhD)
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
qr0udbr0
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
jennyeacort
More Related Content
Similar to Android Workshop Day 3
Pertemuan 13 - Shared Preferences and Settings - Word - Salin.pdf
Pertemuan 13 - Shared Preferences and Settings - Word - Salin.pdf
HendroGunawan8
Android developer fundamentals training overview Part II
Android developer fundamentals training overview Part II
Yoza Aprilio
CISSP Week 13
CISSP Week 13
jemtallon
Windows Phone 8 application security
Windows Phone 8 application security
Andrey Chasovskikh
Windows Security Crash Course
Windows Security Crash Course
UTD Computer Security Group
Anil saldhana securityassurancewithj_bosseap
Anil saldhana securityassurancewithj_bosseap
Anil Saldanha
Securing Startups
Securing Startups
Omaid Faizyar
My first Operating System Presentation
My first Operating System Presentation
Rida Bilgrami
The Ultimate Android Security Checklist (AnDevCon Boston 2014)
The Ultimate Android Security Checklist (AnDevCon Boston 2014)
Ron Munitz
Looking for Vulnerable Code. Vlad Savitsky
Looking for Vulnerable Code. Vlad Savitsky
Vlad Savitsky
JS patterns
JS patterns
Łukasz Wójcik
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Codemotion
Android Security and Peneteration Testing
Android Security and Peneteration Testing
Surabaya Blackhat
cf.Objective() 2017 - Design patterns - Brad Wood
cf.Objective() 2017 - Design patterns - Brad Wood
Ortus Solutions, Corp
The Ultimate Android Security Checklist (Mdevcon 2014)
The Ultimate Android Security Checklist (Mdevcon 2014)
Ron Munitz
EDI_MID_SEMESTER[1].pptx
EDI_MID_SEMESTER[1].pptx
YashGarale1
Cloud Security with LibVMI
Cloud Security with LibVMI
Tamas K Lengyel
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
Ron Munitz
Security Research
Security Research
AGILE IoT
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Dr. Anish Cheriyan (PhD)
Similar to Android Workshop Day 3
(20)
Pertemuan 13 - Shared Preferences and Settings - Word - Salin.pdf
Pertemuan 13 - Shared Preferences and Settings - Word - Salin.pdf
Android developer fundamentals training overview Part II
Android developer fundamentals training overview Part II
CISSP Week 13
CISSP Week 13
Windows Phone 8 application security
Windows Phone 8 application security
Windows Security Crash Course
Windows Security Crash Course
Anil saldhana securityassurancewithj_bosseap
Anil saldhana securityassurancewithj_bosseap
Securing Startups
Securing Startups
My first Operating System Presentation
My first Operating System Presentation
The Ultimate Android Security Checklist (AnDevCon Boston 2014)
The Ultimate Android Security Checklist (AnDevCon Boston 2014)
Looking for Vulnerable Code. Vlad Savitsky
Looking for Vulnerable Code. Vlad Savitsky
JS patterns
JS patterns
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Ron Munitz - The Ultimate Android Security Checklist - Codemotion Rome 2015
Android Security and Peneteration Testing
Android Security and Peneteration Testing
cf.Objective() 2017 - Design patterns - Brad Wood
cf.Objective() 2017 - Design patterns - Brad Wood
The Ultimate Android Security Checklist (Mdevcon 2014)
The Ultimate Android Security Checklist (Mdevcon 2014)
EDI_MID_SEMESTER[1].pptx
EDI_MID_SEMESTER[1].pptx
Cloud Security with LibVMI
Cloud Security with LibVMI
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
The Ultimate Android Security Checklist (Codemotion Tel-Aviv, 2014)
Security Research
Security Research
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Recently uploaded
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
qr0udbr0
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
jennyeacort
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Drew Moseley
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
Hanief Utama
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
ABSYZ Inc
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
FerryKemperman
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
Philip Schwarz
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
StefanoLambiase
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
Marharyta Nedzelska
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
Velvetech LLC
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Angel Borroy López
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Matt Ray
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
smiwainfosol
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
OnePlan Solutions
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
Alina Yurenko
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
Safe Software
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
Łukasz Chruściel
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
Lionel Briand
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
Hironori Washizaki
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
RTS corp
Recently uploaded
(20)
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Android Workshop Day 3
1.
Android Workshop Day
3 Implementing Business Logic Senad Uka May 2014
2.
Get it! ● http://mhalka.com/
3.
Contents ● Goal of
day 3 ● Event handlers ● Threads ● Security model ● Storage options
4.
Goal of Day
3 ● To have a functional application
5.
Event handlers ● Object
of a certain interface ● Anonymous or named class ● More than one object
6.
Event handlers
7.
Event handlers
8.
Threads ● All UI
operations are in single thread (main) ● UI elements are not thread safe
9.
Threads ● Do not
block the UI thread ● Do not access the Android UI toolkit from outside the UI thread
10.
Threads - AsyncTask
11.
Threads - AsyncTask
12.
Security model ● Apps
sandboxed ● App private data ● Permissions ● “Rooting”
13.
Security model –
AppManifest.xml
14.
Storage options ● Shared
Preferences ● Internal Storage ● External Storage ● SQLite Databases ● Network Connection
Download now