02484nam 2200625 a 450 991046211020332120200520144314.01-283-92785-31-118-22843-X(CKB)2670000000240578(EBL)821875(OCoLC)815648715(SSID)ssj0000703212(PQKBManifestationID)11419876(PQKBTitleCode)TC0000703212(PQKBWorkID)10687416(PQKB)10796895(MiAaPQ)EBC821875(CaSebORM)9781118240755(Au-PeEL)EBL821875(CaPaEBR)ebr10630494(CaONFJC)MIL424035(EXLCZ)99267000000024057820120308d2012 uy 0engur|n|---|||||txtccriOS hacker's handbook[electronic resource] /Charlie Miller ... [et al]1st editionIndianapolis, Ind. Wileyc20121 online resource (410 p.)Description based upon print version of record.1-118-24075-8 1-118-20412-3 Includes bibliographical references (p. 365-367) and index.iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks."The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--Source other than Library of Congress.Operating systems (Computers)Security measuresApplication softwareSecurity measuresApplication softwareDevelopmentElectronic books.Operating systems (Computers)Security measures.Application softwareSecurity measures.Application softwareDevelopment.005.8Miller Charles1951-913238MiAaPQMiAaPQMiAaPQBOOK9910462110203321IOS hacker's handbook2045786UNINA