iOS hacker's handbook / Charlie Miller ... [et al].
"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2012 |
Language: | English |
Online Access: | |
Physical Description: | xx, 388 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500821875 |
---|---|
ctrlnum |
(MiAaPQ)500821875 (Au-PeEL)EBL821875 (CaPaEBR)ebr10630494 (CaONFJC)MIL424035 (OCoLC)815648715 |
collection |
bib_alma |
record_format |
marc |
spelling |
iOS hacker's handbook [electronic resource] / Charlie Miller ... [et al]. Indianapolis, Ind. : Wiley, c2012. xx, 388 p. : ill. Includes bibliographical references (p. 365-367) and index. iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks. "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- Source other than Library of Congress. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. iOS (Electronic resource) Operating systems (Computers) Security measures. Application software Security measures. Application software Development. Electronic books. Miller, Charles, 1951- ProQuest (Firm) https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=821875 Click to View |
language |
English |
format |
Electronic eBook |
author2 |
Miller, Charles, 1951- ProQuest (Firm) |
author_facet |
Miller, Charles, 1951- ProQuest (Firm) ProQuest (Firm) |
author2_variant |
c m cm |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Miller, Charles, 1951- |
title |
iOS hacker's handbook |
spellingShingle |
iOS hacker's handbook iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks. |
title_full |
iOS hacker's handbook [electronic resource] / Charlie Miller ... [et al]. |
title_fullStr |
iOS hacker's handbook [electronic resource] / Charlie Miller ... [et al]. |
title_full_unstemmed |
iOS hacker's handbook [electronic resource] / Charlie Miller ... [et al]. |
title_auth |
iOS hacker's handbook |
title_new |
iOS hacker's handbook |
title_sort |
ios hacker's handbook |
publisher |
Wiley, |
publishDate |
2012 |
physical |
xx, 388 p. : ill. |
contents |
iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks. |
isbn |
9781118228432 (electronic bk.) |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.774 I67 I67 42012 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=821875 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
oclc_num |
815648715 |
work_keys_str_mv |
AT millercharles ioshackershandbook AT proquestfirm ioshackershandbook |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500821875 (Au-PeEL)EBL821875 (CaPaEBR)ebr10630494 (CaONFJC)MIL424035 (OCoLC)815648715 |
is_hierarchy_title |
iOS hacker's handbook |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330723703652353 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02082nam a2200421 a 4500</leader><controlfield tag="001">500821875</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">120308s2012 inua sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2012934987</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781118204122 (pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1118204123 (pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118228432 (electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500821875</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL821875</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10630494</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL424035</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815648715</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.774.I67</subfield><subfield code="b">I67 2012</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">iOS hacker's handbook</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">Charlie Miller ... [et al].</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Indianapolis, Ind. :</subfield><subfield code="b">Wiley,</subfield><subfield code="c">c2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 388 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 365-367) and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--</subfield><subfield code="c">Source other than Library of Congress.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">iOS (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Charles,</subfield><subfield code="d">1951-</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=821875</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |