iOS hacker's handbook /
"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--
Zapisane w:
| Kolejni autorzy: | |
|---|---|
| Format: | Elektroniczne E-book |
| Język: | angielski |
| Wydane: |
Indianapolis, Ind. :
Wiley,
[2012]
|
| Hasła przedmiotowe: | |
| Dostęp online: | https://biblioteca.ues.edu.sv/acceso/elibro/?url=https%3A%2F%2Felibro.net%2Fereader%2Fbiblioues/180827 Ver en el OPAC |
| Etykiety: |
Nie ma etykietki, Dołącz pierwszą etykiete!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | ELB180827 | ||
| 003 | FINmELB | ||
| 005 | 20250820144314.0 | ||
| 006 | m o d | | ||
| 007 | cr cn||||||||| | ||
| 008 | 250820s2012 inua sb 001 0 eng d | ||
| 010 | |z 2012934987 | ||
| 020 | |a 9781118228432 |q (ebook) | ||
| 035 | |a (OCoLC)758394188 | ||
| 040 | |a FINmELB |b eng |e rda |c FINmELB | ||
| 050 | 4 | |a QA76.774.I67 |b I67 2012 | |
| 082 | 0 | 4 | |a 005.8 |2 23 |
| 245 | 0 | 0 | |a iOS hacker's handbook / |c Charlie Miller ... [et al]. |
| 264 | 1 | |a Indianapolis, Ind. : |b Wiley, |c [2012] | |
| 264 | 4 | |c Ã2012 | |
| 300 | |a xx, 388 p. : |b ill. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 347 | |a data file |2 rda | ||
| 504 | |a Includes bibliographical references (p. 365-367) and index. | ||
| 505 | 0 | |a iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks. | |
| 520 | |a "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- |c Source other than Library of Congress. | ||
| 588 | |a Description based on metadata supplied by the publisher and other sources. | ||
| 590 | |a Electronic resource. Santa Fe, Argentina: elibro, 2025. Available via the World Wide Web. Access may be limited to libraries affiliated with elibro. | ||
| 630 | 0 | 0 | |a iOS (Electronic resource) |
| 650 | 0 | |a Operating systems (Computers) |x Security measures. | |
| 650 | 0 | |a Application software |x Security measures. | |
| 650 | 0 | |a Application software |x Development. | |
| 655 | 4 | |a Electronic books. | |
| 700 | 1 | |a Miller, Charles, |d 1951- | |
| 797 | 2 | |a elibro, Corp. | |
| 856 | 4 | 0 | |u https://biblioteca.ues.edu.sv/acceso/elibro/?url=https%3A%2F%2Felibro.net%2Fereader%2Fbiblioues/180827 |