iOS hacker's handbook:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Indianapolis, Ind.
Wiley
c2012
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references (p. 365-367) and index "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- |
Beschreibung: | xx, 388 p. |
ISBN: | 9781118228432 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV044160139 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 170217s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781118228432 |c Online |9 978-1-118-22843-2 | ||
035 | |a (ZDB-30-PAD)EBC821875 | ||
035 | |a (ZDB-89-EBL)EBL821875 | ||
035 | |a (OCoLC)815648715 | ||
035 | |a (DE-599)BVBBV044160139 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a iOS hacker's handbook |c Charlie Miller ... [et al] |
264 | 1 | |a Indianapolis, Ind. |b Wiley |c c2012 | |
300 | |a xx, 388 p. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 365-367) and index | ||
500 | |a "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- | ||
505 | 0 | |a iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks | |
630 | 0 | 4 | |a iOS (Electronic resource) |
650 | 4 | |a Operating systems (Computers) |x Security measures | |
650 | 4 | |a Application software |x Security measures | |
650 | 4 | |a Application software |x Development | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a iOS |0 (DE-588)7845187-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a iOS |0 (DE-588)7845187-5 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Miller, Charles |d 1951- |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-1-118-20412-2 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 1-118-20412-3 |
912 | |a ZDB-30-PAD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029566984 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804177270492889088 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV044160139 |
collection | ZDB-30-PAD |
contents | iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks |
ctrlnum | (ZDB-30-PAD)EBC821875 (ZDB-89-EBL)EBL821875 (OCoLC)815648715 (DE-599)BVBBV044160139 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02171nmm a2200469zc 4500</leader><controlfield tag="001">BV044160139</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170217s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118228432</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-118-22843-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC821875</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL821875</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)815648715</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044160139</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">iOS hacker's handbook</subfield><subfield code="c">Charlie Miller ... [et al]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Ind.</subfield><subfield code="b">Wiley</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xx, 388 p.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 365-367) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">iOS (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">iOS</subfield><subfield code="0">(DE-588)7845187-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">iOS</subfield><subfield code="0">(DE-588)7845187-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Charles</subfield><subfield code="d">1951-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-1-118-20412-2</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">1-118-20412-3</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PAD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029566984</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV044160139 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:45:25Z |
institution | BVB |
isbn | 9781118228432 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029566984 |
oclc_num | 815648715 |
open_access_boolean | |
physical | xx, 388 p. |
psigel | ZDB-30-PAD |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Wiley |
record_format | marc |
spelling | iOS hacker's handbook Charlie Miller ... [et al] Indianapolis, Ind. Wiley c2012 xx, 388 p. txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. 365-367) and index "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks iOS (Electronic resource) Operating systems (Computers) Security measures Application software Security measures Application software Development Datensicherung (DE-588)4011144-1 gnd rswk-swf iOS (DE-588)7845187-5 gnd rswk-swf iOS (DE-588)7845187-5 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Miller, Charles 1951- Sonstige oth Erscheint auch als Druck-Ausgabe, Paperback 978-1-118-20412-2 Erscheint auch als Druck-Ausgabe, Paperback 1-118-20412-3 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | iOS hacker's handbook iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks iOS (Electronic resource) Operating systems (Computers) Security measures Application software Security measures Application software Development Datensicherung (DE-588)4011144-1 gnd iOS (DE-588)7845187-5 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)7845187-5 |
title | iOS hacker's handbook |
title_auth | iOS hacker's handbook |
title_exact_search | iOS hacker's handbook |
title_full | iOS hacker's handbook Charlie Miller ... [et al] |
title_fullStr | iOS hacker's handbook Charlie Miller ... [et al] |
title_full_unstemmed | iOS hacker's handbook Charlie Miller ... [et al] |
title_short | iOS hacker's handbook |
title_sort | ios hacker s handbook |
topic | iOS (Electronic resource) Operating systems (Computers) Security measures Application software Security measures Application software Development Datensicherung (DE-588)4011144-1 gnd iOS (DE-588)7845187-5 gnd |
topic_facet | iOS (Electronic resource) Operating systems (Computers) Security measures Application software Security measures Application software Development Datensicherung iOS |
work_keys_str_mv | AT millercharles ioshackershandbook |