|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910462110203321 |
|
|
Titolo |
iOS hacker's handbook [[electronic resource] /] / Charlie Miller ... [et al] |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Indianapolis, Ind., : Wiley, c2012 |
|
|
|
|
|
|
|
ISBN |
|
1-283-92785-3 |
1-118-22843-X |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (410 p.) |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Operating systems (Computers) - Security measures |
Application software - Security measures |
Application software - Development |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (p. 365-367) and index. |
|
|
|
|
|
|
Nota di contenuto |
|
iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- |
|
|
|
|
|
|
|