Cargando…

Hacking and securing iOS applications /

"If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and m...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Zdziarski, Jonathan A.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol : O'Reilly Media, ©2012.
Edición:1st ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ia 4500
001 OR_ocn773567169
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 120123s2012 caua ob 000 0 eng d
010 |a  2012360962 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d XII  |d UMI  |d COO  |d N$T  |d OCLCQ  |d YDXCP  |d WAU  |d DEBSZ  |d OCLCQ  |d TEFOD  |d OCLCQ  |d OCLCF  |d OCLCQ  |d OCLCO  |d E7B  |d TEFOD  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d FEM  |d Z5A  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d MERER  |d OCLCA  |d BRL  |d CEF  |d OCLCQ  |d TOF  |d MOQ  |d WYU  |d OCLCO  |d UAB  |d AU@  |d VT2  |d UHL  |d UKAHL  |d OCLCQ  |d UK7LJ  |d INARC  |d OCLCO  |d OCLCQ 
019 |a 788498578  |a 815432698  |a 861530775  |a 968074083  |a 969025695  |a 1066598869  |a 1103269244  |a 1113678360  |a 1129350407  |a 1153035918  |a 1156105678  |a 1192339242  |a 1240536516  |a 1285558936 
020 |a 9781449325244  |q (electronic bk.) 
020 |a 1449325246  |q (electronic bk.) 
020 |a 9781449325237  |q (electronic bk.) 
020 |a 1449325238  |q (electronic bk.) 
020 |z 9781449325213 
020 |z 1449325211 
020 |z 9781449318741  |q (paper) 
020 |z 1449318746  |q (paper) 
024 8 |a 9781449325213 
029 1 |a AU@  |b 000049052937 
029 1 |a DEBBG  |b BV040901702 
029 1 |a DEBSZ  |b 378290568 
029 1 |a DEBSZ  |b 381377423 
029 1 |a DEBSZ  |b 397231202 
029 1 |a NZ1  |b 14520422 
029 1 |a NZ1  |b 15176364 
029 1 |a AU@  |b 000062625047 
029 1 |a AU@  |b 000066230931 
035 |a (OCoLC)773567169  |z (OCoLC)788498578  |z (OCoLC)815432698  |z (OCoLC)861530775  |z (OCoLC)968074083  |z (OCoLC)969025695  |z (OCoLC)1066598869  |z (OCoLC)1103269244  |z (OCoLC)1113678360  |z (OCoLC)1129350407  |z (OCoLC)1153035918  |z (OCoLC)1156105678  |z (OCoLC)1192339242  |z (OCoLC)1240536516  |z (OCoLC)1285558936 
037 |a CL0500000134  |b Safari Books Online 
037 |a E01E57F6-A52D-45E1-BB47-A5B999338A37  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.8.I862  |b Z889 2012eb 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM  |x 051370  |2 bisacsh 
082 0 4 |a 005.26 
049 |a UAMI 
100 1 |a Zdziarski, Jonathan A. 
245 1 0 |a Hacking and securing iOS applications /  |c Jonathan Zdziarski. 
250 |a 1st ed. 
260 |a Sebastopol :  |b O'Reilly Media,  |c ©2012. 
300 |a 1 online resource (xv, 336 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |2 rda 
504 |a Includes bibliographical references. 
505 0 |a Everything You Know Is Wrong -- The Basics of Compromising iOS -- Stealing the Filesystem -- Forensic Trace and Data Leakage -- Defeating Encryption -- Unobliterating Files -- Manipulating the Runtime -- Abusing the Runtime Library -- Hijacking Traffic -- Implementing Encryption -- Counter Forensics -- Securing the Runtime -- Jailbreak Detection -- Next Steps. 
520 |a "If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary"--Provided by publisher. 
588 0 |a Print version record. 
542 |f Copyright © O'Reilly Media, Inc.  |g 2012. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a iOS (Electronic resource)  |x Security measures. 
630 0 7 |a IOS (Electronic resource) / Security measures.  |2 blmlsh 
630 0 7 |a IOS (Electronic resource)  |2 fast  |0 (OCoLC)fst01784820 
650 0 |a Application software  |x Development. 
650 0 |a Objective-C (Computer program language) 
650 0 |a Computer security. 
650 0 |a Software protection. 
650 2 |a Computer Security 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Objective-C (Langage de programmation) 
650 6 |a Sécurité informatique. 
650 6 |a Logiciels  |x Protection. 
650 7 |a COMPUTERS  |x Programming  |x Apple Programming.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Application software  |x Development.  |2 fast  |0 (OCoLC)fst00811707 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Objective-C (Computer program language)  |2 fast  |0 (OCoLC)fst01747074 
650 7 |a Security systems.  |2 fast  |0 (OCoLC)fst01110883 
650 7 |a Software protection.  |2 fast  |0 (OCoLC)fst01124212 
776 0 8 |i Print version:  |a Zdziarski, Jonathan A.  |t Hacking and securing iOS applications.  |b 1st ed.  |d Sebastopol, CA : O'Reilly Media, ©2012  |z 9781449318741  |w (DLC) 2012360962  |w (OCoLC)768796873 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781449325213/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21641499 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL843730 
938 |a ebrary  |b EBRY  |n ebr10758616 
938 |a EBSCOhost  |b EBSC  |n 432201 
938 |a YBP Library Services  |b YANK  |n 7362740 
938 |a Internet Archive  |b INAR  |n hackingsecuringi0000zdzi 
994 |a 92  |b IZTAP