Book Image

Android UI Design

By : Jessica Thornsby
Book Image

Android UI Design

By: Jessica Thornsby

Overview of this book

<p>Great design is one of the key drivers in the adoption of new applications, yet unfortunately design considerations are often neglected in the face of “will it work,” “can we make it quicker,” or “can we get more people using it”?</p> <p>This book seeks to redress this balance by showing you how to get your PM to start treating the design phase of your project seriously. This book is focused entirely on the development of UI features, and you’ll be able to practically implementing the design practices that we extol throughout the book.</p> <p>Starting by briefly outlining some of the factors you need to keep in mind when building a UI, you’ll learn the concepts of Android User Interface from scratch. We then move on to formulate a plan on how to implement these concepts in various applications. We will deep dive into how UI features are implemented in real-world applications where UIs are complex and dynamic.</p> <p>This book offers near complete coverage of UI-specific content including, views, fragments, the wireframing process, and how to add in splash screens—everything you need to make professional standard UIs for modern applications. It will then cover material design and show you how to implement Google's design aesthetic in a practical manner. Finally, it ensures the best possible user experience by analyzing the UI using various tools, and then addressing any problems they uncover.</p> <p>By the end of the book, you’ll be able to leverage the concepts of Android User Interface in your applications in order to attract new customers.</p>
Table of Contents (16 chapters)
Android UI Design
Credits
About the Author
About the Reviewer
www.PacktPub.com
Preface

Chapter 10. Best Practices and Securing Your Application

The Android operating system was designed in anticipation of hackers attempting to perform common attacks, such as social engineering attacks that try to trick the user into handing over their personal information or installing malware.

Android comes with built-in security features that significantly reduce the chances of security exploits succeeding, and that limit the impact of any attacks that do succeed.

These built-in security controls provide you, your application, and your users with a certain level of protection by default. Nevertheless, following security best practices is essential for further reducing the chances of your app leaving users vulnerable to exploits, data leaks, and other security-related issues.

In this chapter, we're going to look at how you can make the most of Android's built-in security features. Towards the end of this chapter, I'll also look at some best practices we haven't covered in detail in any of the...