gogo

iOS hacker's handbook [electronic resource] / Charlie Miller ... [et al].

Contributor(s): Material type: TextTextPublication details: Indianapolis, Ind. : Wiley, c2012.Description: xx, 388 p. : illSubject(s): Genre/Form: DDC classification:
  • 005.8 23
LOC classification:
  • QA76.774.I67 I67 2012
Online resources:
Contents:
iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks.
Summary: "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- Source other than Library of Congress.
Holdings
Item type Current library Call number Status Date due Barcode
Ebook TUS: Midlands, Main Library Athlone Online eBook (Browse shelf(Opens below)) Available

Includes bibliographical references (p. 365-367) and index.

iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks.

"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- Source other than Library of Congress.

Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.

Powered by Koha