LEADER 02484nam 2200625 a 450 001 9910462110203321 005 20200520144314.0 010 $a1-283-92785-3 010 $a1-118-22843-X 035 $a(CKB)2670000000240578 035 $a(EBL)821875 035 $a(OCoLC)815648715 035 $a(SSID)ssj0000703212 035 $a(PQKBManifestationID)11419876 035 $a(PQKBTitleCode)TC0000703212 035 $a(PQKBWorkID)10687416 035 $a(PQKB)10796895 035 $a(MiAaPQ)EBC821875 035 $a(CaSebORM)9781118240755 035 $a(Au-PeEL)EBL821875 035 $a(CaPaEBR)ebr10630494 035 $a(CaONFJC)MIL424035 035 $a(EXLCZ)992670000000240578 100 $a20120308d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aiOS hacker's handbook$b[electronic resource] /$fCharlie Miller ... [et al] 205 $a1st edition 210 $aIndianapolis, Ind. $cWiley$dc2012 215 $a1 online resource (410 p.) 300 $aDescription based upon print version of record. 311 $a1-118-24075-8 311 $a1-118-20412-3 320 $aIncludes bibliographical references (p. 365-367) and index. 327 $aiOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks. 330 $a"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--$cSource other than Library of Congress. 606 $aOperating systems (Computers)$xSecurity measures 606 $aApplication software$xSecurity measures 606 $aApplication software$xDevelopment 608 $aElectronic books. 615 0$aOperating systems (Computers)$xSecurity measures. 615 0$aApplication software$xSecurity measures. 615 0$aApplication software$xDevelopment. 676 $a005.8 701 $aMiller$b Charles$f1951-$0913238 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910462110203321 996 $aIOS hacker's handbook$92045786 997 $aUNINA