Record ID | marc_loc_updates/v40.i29.records.utf8:14228843:1561 |
Source | Library of Congress |
Download Link | /show-records/marc_loc_updates/v40.i29.records.utf8:14228843:1561?format=raw |
LEADER: 01561nam a22003017a 4500
001 2012934987
003 DLC
005 20120711141146.0
008 120308s2012 inua b 001 0 eng d
010 $a 2012934987
020 $a9781118204122 (pbk.)
020 $a1118204123 (pbk.)
035 $a(OCoLC)ocn758394188
040 $aBTCTA$beng$cBTCTA$dBDX$dNZWLI$dDPL$dYDXCP$dBWX$dUAB$dIXA$dDLC
042 $alccopycat
050 00 $aQA76.774.I67$bI67 2012
082 04 $a005.8$223
245 00 $aiOS hacker's handbook /$cCharlie Miller ... [et al].
260 $aIndianapolis, IN :$bWiley,$cc2012.
300 $axx, 388 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references (p. 365-367) and index.
505 0 $aiOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks.
520 $a"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--$cSource other than Library of Congress.
630 00 $aiOS (Electronic resource)
650 0 $aOperating systems (Computers)$xSecurity measures.
650 0 $aApplication software$xSecurity measures.
650 0 $aApplication software$xDevelopment.
700 1 $aMiller, Charles,$d1951-