|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4842-2355-0 |
003 |
DE-He213 |
005 |
20220124160036.0 |
007 |
cr nn 008mamaa |
008 |
161209s2016 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484223550
|9 978-1-4842-2355-0
|
024 |
7 |
|
|a 10.1007/978-1-4842-2355-0
|2 doi
|
050 |
|
4 |
|a QA76.8.M3
|
050 |
|
4 |
|a QA76.774.I67
|
072 |
|
7 |
|a UMQ
|2 bicssc
|
072 |
|
7 |
|a ULH
|2 bicssc
|
072 |
|
7 |
|a COM051370
|2 bisacsh
|
072 |
|
7 |
|a UMQ
|2 thema
|
072 |
|
7 |
|a ULH
|2 thema
|
082 |
0 |
4 |
|a 005.268
|2 23
|
100 |
1 |
|
|a Relan, Kunal.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a iOS Penetration Testing
|h [electronic resource] :
|b A Definitive Guide to iOS Security /
|c by Kunal Relan.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2016.
|
300 |
|
|
|a XIX, 135 p. 122 illus., 114 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
520 |
|
|
|a Although a tough system to manipulate, there are still critical iOS security bugs that can be exploited. In response to this issue, author Kunal Relan offers a concise, deep dive into iOS security, including all the tools and methods to master reverse engineering of iOS apps and penetration testing. iOS Penetration Testing covers the most significant attacks threatening iOS applications in recent times. The readers will also learn methods of patching iOS applications to make payment transactions and personal data sharing more secure. If you're a security professional, IS analyst, iOS Reverse Engineer or developer, or simply interested in secure application development, iOS Penetration Testing is a must have.
|
650 |
|
0 |
|a Apple computer.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Data protection.
|
650 |
1 |
4 |
|a Apple and iOS.
|
650 |
2 |
4 |
|a Software Engineering.
|
650 |
2 |
4 |
|a Cryptology.
|
650 |
2 |
4 |
|a Data and Information Security.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484223543
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484223567
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4842-2355-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-CWD
|
912 |
|
|
|a ZDB-2-SXPC
|
950 |
|
|
|a Professional and Applied Computing (SpringerNature-12059)
|
950 |
|
|
|a Professional and Applied Computing (R0) (SpringerNature-43716)
|