Android security cookbook / / Keith Makan, Scott Alexander-Brown
| Android security cookbook / / Keith Makan, Scott Alexander-Brown |
| Autore | Makan Keith |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (350 p.) |
| Disciplina | 005.258 |
| Altri autori (Persone) | Alexander-BrownScott |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-78216-717-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
| Record Nr. | UNINA-9910453383103321 |
Makan Keith
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security cookbook / / Keith Makan, Scott Alexander-Brown
| Android security cookbook / / Keith Makan, Scott Alexander-Brown |
| Autore | Makan Keith |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (350 p.) |
| Disciplina | 005.258 |
| Altri autori (Persone) | Alexander-BrownScott |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
| ISBN | 1-78216-717-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
| Record Nr. | UNINA-9910790736703321 |
Makan Keith
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security cookbook / / Keith Makan, Scott Alexander-Brown
| Android security cookbook / / Keith Makan, Scott Alexander-Brown |
| Autore | Makan Keith |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2013 |
| Descrizione fisica | 1 online resource (350 p.) |
| Disciplina | 005.258 |
| Altri autori (Persone) | Alexander-BrownScott |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures |
| ISBN |
9781782167174
178216717X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: Android Development Tools; Introduction; Installing the Android Development Tools (ADT); Installing the Java Development Kit (JDK); Updating the API sources; Alternative installation of the ADT; Installing the Native Development Kit (NDK); Emulating Android; Creating Android Virtual Devices (AVDs); Using the Android Debug Bridge (ADB) to interact with the AVDs; Copying files off/onto an AVD; Installing applications onto the AVDs via ADB
Chapter 2: Engaging with Application SecurityIntroduction; Inspecting application certificates and signatures; Signing Android applications; Verifying application signatures; Inspecting the AndroidManifest.xml file; Interacting with the activity manager via ADB; Extracting application resources via ADB; Chapter 3: Android Security Assessment Tools; Introduction; Installing and setting up Santoku; Setting up drozer; Running a drozer session; Enumerating installed packages; Enumerating activities; Enumerating content providers; Enumerating services; Enumerating broadcast receivers Determining application attack surfacesLaunching activities; Writing a drozer module - a device enumeration module; Writing an application certificate enumerator; Chapter 4: Exploiting Applications; Introduction; Information disclosure via logcat; Inspecting network traffic; Passive intent sniffing via the activity manager; Attacking services; Attacking broadcast receivers; Enumerating vulnerable content providers; Extracting data from vulnerable content providers; Inserting data into content providers; Enumerating SQL-injection vulnerable content providers; Exploiting debuggable applications Man in the middle attacks on applicationsChapter 5: Protecting Applications; Introduction; Securing application components; Protecting components with custom permissions; Protecting content provider paths; Defending against SQL injection attack; Application signature verification (anti-tamper); Tamper protection by detecting the installer, emulator, and debug flag; Removing all log messages with ProGuard; Advanced code obfuscation with DexGuard; Chapter 6: Reverse Engineering Applications; Introduction; Compiling from Java to DEX; Decompiling DEX files; Interpreting the Dalvik bytecode Decompiling DEX to JavaDecompiling application native libraries; Debugging the Android processes using the GDB server; Chapter 7: Secure Networking; Introduction; Validating self-signed SSL certificates; Using StrongTrustManager from the OnionKit library; SSL pinning; Chapter 8: Native Exploitation and Analysis; Introduction; Inspecting file permissions; Cross-compiling native executables; Exploitation of race condition vulnerabilities; Stack memory corruption exploitation; Automated native Android fuzzing; Chapter 9: Encryption and Developing Device Administration Policies; Introduction Using cryptography libraries |
| Record Nr. | UNINA-9910957467303321 |
Makan Keith
|
||
| Birmingham : , : Packt Publishing, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer]
| Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer] |
| Autore | Elenkov Nikolay |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | San Francisco : , : No Starch Press, , [2015] |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina | 004.1675 |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures Mobile computing - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-4571-8549-0
1-59327-641-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; Summary
Chapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package Management Android Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest User User Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; Cipher MacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets Peer Authentication |
| Record Nr. | UNINA-9910459905203321 |
Elenkov Nikolay
|
||
| San Francisco : , : No Starch Press, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer]
| Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer] |
| Autore | Elenkov Nikolay |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | San Francisco : , : No Starch Press, , [2015] |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina | 004.1675 |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures Mobile computing - Security measures |
| ISBN |
1-4571-8549-0
1-59327-641-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; Summary
Chapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package Management Android Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest User User Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; Cipher MacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets Peer Authentication |
| Record Nr. | UNINA-9910787243403321 |
Elenkov Nikolay
|
||
| San Francisco : , : No Starch Press, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer]
| Android security internals : an in-depth guide to android's security architecture / / by Nikolay Elenkov ; [foreword by Jon Sawyer] |
| Autore | Elenkov Nikolay |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | San Francisco : , : No Starch Press, , [2015] |
| Descrizione fisica | 1 online resource (434 p.) |
| Disciplina | 004.1675 |
| Soggetto topico |
Operating systems (Computers) - Security measures
Smartphones - Security measures Mobile computing - Security measures |
| ISBN |
1-4571-8549-0
1-59327-641-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
About the Author; Brief Contents; Contents in Detail; Foreword; Acknowledgments; Introduction; Who This Book Is For; Prerequisites; Android Versions; How Is This Book Organized?; Conventions; Chapter 1: Android's Security Model; Android's Architecture; Linux Kernel; Native User Space; Dalvik VM; Java Runtime Libraries; System Services; Inter-Process Communication; Binder; Android Framework Libraries; Applications; Android's Security Model; Application Sandboxing; Permissions; IPC; Code Signing and Platform Keys; Multi-User Support; SELinux; System Updates; Verified Boot; Summary
Chapter 2: Permissions The Nature of Permissions; Requesting Permissions; Permission Management; Permission Protection Levels; Permission Assignment; Permission Enforcement; Kernel-Level Enforcement; Native Daemon-Level Enforcement; Framework-Level Enforcement; System Permissions; Signature Permissions; Development Permissions; Shared User ID; Custom Permissions; Public and Private Components; Activity and Service Permissions; Broadcast Permissions; Content Provider Permissions; Static Provider Permissions; Dynamic Provider Permissions; Pending Intents; Summary; Chapter 3: Package Management Android Application Package Format Code Signing; Java Code Signing; Android Code Signing; APK Install Process; Location of Application Packages and Data; Active Components; Installing a Local Package; Updating a Package; Installing Encrypted APKs; Forward Locking; Android 4.1 Forward Locking Implementation; Encrypted Apps and Google Play; Package Verification; Android Support for Package Verification; Google Play Implementation; Summary; Chapter 4: User Management; Multi-User Support Overview; Types of Users; The Primary User (Owner); Secondary Users; Restricted Profiles; Guest User User Management Command-Line Tools; User States and Related Broadcasts; User Metadata; The User List File; User Metadata Files; User System Directory; Per-User Application Management; Application Data Directories; Application Sharing; External Storage; External Storage Implementations; Multi-User External Storage; External Storage Permissions; Other Multi-User Features; Summary; Chapter 5: Cryptographic Providers; JCA Provider Architecture; Cryptographic Service Providers; JCA Engine Classes; Obtaining an Engine Class Instance; Algorithm Names; Secure Random; Message Digest; Signature; Cipher MacKey; SecretKey and PBEKey; PublicKey, PrivateKey, and KeyPair; KeySpec; KeyFactory; SecretKeyFactory; Key Pair Generator; KeyGenerator; KeyAgreement; KeyStore; CertificateFactory and CertPath; CertPathValidator and CertPathBuilder; Android JCA Providers; Harmony's Crypto Provider; Android's Bouncy Castle Provider; AndroidOpenSSL Provider; OpenSSL; Using a Custom Provider; Spongy Castle; Summary; Chapter 6: Network Security and PKI ; PKI and SSL Overview; Public Key Certificates; Direct Trust and Private CAs; Public Key Infrastructure; Certificate Revocation; JSSE Introduction; Secure Sockets Peer Authentication |
| Record Nr. | UNINA-9910815977403321 |
Elenkov Nikolay
|
||
| San Francisco : , : No Starch Press, , [2015] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats / / Srinivasa Rao Kotipalli, Mohammed A. Imran
| Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats / / Srinivasa Rao Kotipalli, Mohammed A. Imran |
| Autore | Kotipalli Srinivasa Rao |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2016 |
| Descrizione fisica | 1 online resource (376 pages) : color illustrations |
| Collana | Community experience distilled |
| Soggetto topico | Operating systems (Computers) - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-78588-800-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910466003003321 |
Kotipalli Srinivasa Rao
|
||
| Birmingham : , : Packt Publishing, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats / / Srinivasa Rao Kotipalli, Mohammed A. Imran
| Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats / / Srinivasa Rao Kotipalli, Mohammed A. Imran |
| Autore | Kotipalli Srinivasa Rao |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2016 |
| Descrizione fisica | 1 online resource (376 pages) : color illustrations |
| Collana | Community experience distilled |
| Soggetto topico | Operating systems (Computers) - Security measures |
| ISBN | 1-78588-800-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910798523503321 |
Kotipalli Srinivasa Rao
|
||
| Birmingham : , : Packt Publishing, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats / / Srinivasa Rao Kotipalli, Mohammed A. Imran
| Hacking Android : explore every nook and cranny of the Android OS to modify your device and guard it against security threats / / Srinivasa Rao Kotipalli, Mohammed A. Imran |
| Autore | Kotipalli Srinivasa Rao |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Birmingham : , : Packt Publishing, , 2016 |
| Descrizione fisica | 1 online resource (376 pages) : color illustrations |
| Collana | Community experience distilled |
| Soggetto topico | Operating systems (Computers) - Security measures |
| ISBN | 1-78588-800-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910828087803321 |
Kotipalli Srinivasa Rao
|
||
| Birmingham : , : Packt Publishing, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
iOS hacker's handbook [[electronic resource] /] / Charlie Miller ... [et al]
| iOS hacker's handbook [[electronic resource] /] / Charlie Miller ... [et al] |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Indianapolis, Ind., : Wiley, c2012 |
| Descrizione fisica | 1 online resource (410 p.) |
| Disciplina | 005.8 |
| Altri autori (Persone) | MillerCharles <1951-> |
| Soggetto topico |
Operating systems (Computers) - Security measures
Application software - Security measures Application software - Development |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-283-92785-3
1-118-22843-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks. |
| Record Nr. | UNINA-9910462110203321 |
| Indianapolis, Ind., : Wiley, c2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||