iOS hacker's handbook:
"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
2012
|
Schlagworte: | |
Zusammenfassung: | "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover |
Beschreibung: | Includes bibliographical references and index iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks |
Beschreibung: | xx, 388 p. ill. 24 cm |
ISBN: | 9781118204122 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040194815 | ||
003 | DE-604 | ||
005 | 20121105 | ||
007 | t | ||
008 | 120531s2012 a||| |||| 00||| eng d | ||
020 | |a 9781118204122 |9 978-1-118-20412-2 | ||
035 | |a (OCoLC)796254458 | ||
035 | |a (DE-599)BVBBV040194815 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-522 |a DE-91G | ||
084 | |a DAT 437f |2 stub | ||
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 125f |2 stub | ||
245 | 1 | 0 | |a iOS hacker's handbook |c Charlie Miller ... [et al] |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c 2012 | |
300 | |a xx, 388 p. |b ill. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
500 | |a iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks | ||
520 | |a "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover | ||
650 | 4 | |a iOS (Electronic resource) | |
650 | 4 | |a Operating systems (Computers) / Security measures | |
650 | 4 | |a Application software / Security measures | |
650 | 4 | |a Application software / Development | |
650 | 0 | 7 | |a iOS |0 (DE-588)7845187-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a iOS |0 (DE-588)7845187-5 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Miller, Charlie |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-22843-2 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-24075-5 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-118-26554-3 |
999 | |a oai:aleph.bib-bvb.de:BVB01-025051323 |
Datensatz im Suchindex
_version_ | 1804149193831350272 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV040194815 |
classification_tum | DAT 437f DAT 460f DAT 125f |
ctrlnum | (OCoLC)796254458 (DE-599)BVBBV040194815 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02110nam a2200469 c 4500</leader><controlfield tag="001">BV040194815</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20121105 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120531s2012 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118204122</subfield><subfield code="9">978-1-118-20412-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)796254458</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040194815</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 437f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 125f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">iOS hacker's handbook</subfield><subfield code="c">Charlie Miller ... [et al]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 388 p.</subfield><subfield code="b">ill.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">iOS (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers) / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software / Development</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">iOS</subfield><subfield code="0">(DE-588)7845187-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">iOS</subfield><subfield code="0">(DE-588)7845187-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Charlie</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-22843-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-24075-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-118-26554-3</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025051323</subfield></datafield></record></collection> |
id | DE-604.BV040194815 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:19:08Z |
institution | BVB |
isbn | 9781118204122 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025051323 |
oclc_num | 796254458 |
open_access_boolean | |
owner | DE-29T DE-522 DE-91G DE-BY-TUM |
owner_facet | DE-29T DE-522 DE-91G DE-BY-TUM |
physical | xx, 388 p. ill. 24 cm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Wiley |
record_format | marc |
spelling | iOS hacker's handbook Charlie Miller ... [et al] Indianapolis, Ind. Wiley 2012 xx, 388 p. ill. 24 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover iOS (Electronic resource) Operating systems (Computers) / Security measures Application software / Security measures Application software / Development iOS (DE-588)7845187-5 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf iOS (DE-588)7845187-5 s Datensicherung (DE-588)4011144-1 s DE-604 Miller, Charlie Sonstige oth Erscheint auch als Online-Ausgabe 978-1-118-22843-2 Erscheint auch als Online-Ausgabe 978-1-118-24075-5 Erscheint auch als Online-Ausgabe 978-1-118-26554-3 |
spellingShingle | iOS hacker's handbook iOS (Electronic resource) Operating systems (Computers) / Security measures Application software / Security measures Application software / Development iOS (DE-588)7845187-5 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)7845187-5 (DE-588)4011144-1 |
title | iOS hacker's handbook |
title_auth | iOS hacker's handbook |
title_exact_search | iOS hacker's handbook |
title_full | iOS hacker's handbook Charlie Miller ... [et al] |
title_fullStr | iOS hacker's handbook Charlie Miller ... [et al] |
title_full_unstemmed | iOS hacker's handbook Charlie Miller ... [et al] |
title_short | iOS hacker's handbook |
title_sort | ios hacker s handbook |
topic | iOS (Electronic resource) Operating systems (Computers) / Security measures Application software / Security measures Application software / Development iOS (DE-588)7845187-5 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | iOS (Electronic resource) Operating systems (Computers) / Security measures Application software / Security measures Application software / Development iOS Datensicherung |
work_keys_str_mv | AT millercharlie ioshackershandbook |