|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
OR_ocn773567169 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
120123s2012 caua ob 000 0 eng d |
010 |
|
|
|a 2012360962
|
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d XII
|d UMI
|d COO
|d N$T
|d OCLCQ
|d YDXCP
|d WAU
|d DEBSZ
|d OCLCQ
|d TEFOD
|d OCLCQ
|d OCLCF
|d OCLCQ
|d OCLCO
|d E7B
|d TEFOD
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d FEM
|d Z5A
|d OCLCA
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d MERER
|d OCLCA
|d BRL
|d CEF
|d OCLCQ
|d TOF
|d MOQ
|d WYU
|d OCLCO
|d UAB
|d AU@
|d VT2
|d UHL
|d UKAHL
|d OCLCQ
|d UK7LJ
|d INARC
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 788498578
|a 815432698
|a 861530775
|a 968074083
|a 969025695
|a 1066598869
|a 1103269244
|a 1113678360
|a 1129350407
|a 1153035918
|a 1156105678
|a 1192339242
|a 1240536516
|a 1285558936
|
020 |
|
|
|a 9781449325244
|q (electronic bk.)
|
020 |
|
|
|a 1449325246
|q (electronic bk.)
|
020 |
|
|
|a 9781449325237
|q (electronic bk.)
|
020 |
|
|
|a 1449325238
|q (electronic bk.)
|
020 |
|
|
|z 9781449325213
|
020 |
|
|
|z 1449325211
|
020 |
|
|
|z 9781449318741
|q (paper)
|
020 |
|
|
|z 1449318746
|q (paper)
|
024 |
8 |
|
|a 9781449325213
|
029 |
1 |
|
|a AU@
|b 000049052937
|
029 |
1 |
|
|a DEBBG
|b BV040901702
|
029 |
1 |
|
|a DEBSZ
|b 378290568
|
029 |
1 |
|
|a DEBSZ
|b 381377423
|
029 |
1 |
|
|a DEBSZ
|b 397231202
|
029 |
1 |
|
|a NZ1
|b 14520422
|
029 |
1 |
|
|a NZ1
|b 15176364
|
029 |
1 |
|
|a AU@
|b 000062625047
|
029 |
1 |
|
|a AU@
|b 000066230931
|
035 |
|
|
|a (OCoLC)773567169
|z (OCoLC)788498578
|z (OCoLC)815432698
|z (OCoLC)861530775
|z (OCoLC)968074083
|z (OCoLC)969025695
|z (OCoLC)1066598869
|z (OCoLC)1103269244
|z (OCoLC)1113678360
|z (OCoLC)1129350407
|z (OCoLC)1153035918
|z (OCoLC)1156105678
|z (OCoLC)1192339242
|z (OCoLC)1240536516
|z (OCoLC)1285558936
|
037 |
|
|
|a CL0500000134
|b Safari Books Online
|
037 |
|
|
|a E01E57F6-A52D-45E1-BB47-A5B999338A37
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.8.I862
|b Z889 2012eb
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 051370
|2 bisacsh
|
082 |
0 |
4 |
|a 005.26
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Zdziarski, Jonathan A.
|
245 |
1 |
0 |
|a Hacking and securing iOS applications /
|c Jonathan Zdziarski.
|
250 |
|
|
|a 1st ed.
|
260 |
|
|
|a Sebastopol :
|b O'Reilly Media,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xv, 336 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rda
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Everything You Know Is Wrong -- The Basics of Compromising iOS -- Stealing the Filesystem -- Forensic Trace and Data Leakage -- Defeating Encryption -- Unobliterating Files -- Manipulating the Runtime -- Abusing the Runtime Library -- Hijacking Traffic -- Implementing Encryption -- Counter Forensics -- Securing the Runtime -- Jailbreak Detection -- Next Steps.
|
520 |
|
|
|a "If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary"--Provided by publisher.
|
588 |
0 |
|
|a Print version record.
|
542 |
|
|
|f Copyright © O'Reilly Media, Inc.
|g 2012.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a iOS (Electronic resource)
|x Security measures.
|
630 |
0 |
7 |
|a IOS (Electronic resource) / Security measures.
|2 blmlsh
|
630 |
0 |
7 |
|a IOS (Electronic resource)
|2 fast
|0 (OCoLC)fst01784820
|
650 |
|
0 |
|a Application software
|x Development.
|
650 |
|
0 |
|a Objective-C (Computer program language)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Software protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Logiciels d'application
|x Développement.
|
650 |
|
6 |
|a Objective-C (Langage de programmation)
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Logiciels
|x Protection.
|
650 |
|
7 |
|a COMPUTERS
|x Programming
|x Apple Programming.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Application software
|x Development.
|2 fast
|0 (OCoLC)fst00811707
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Objective-C (Computer program language)
|2 fast
|0 (OCoLC)fst01747074
|
650 |
|
7 |
|a Security systems.
|2 fast
|0 (OCoLC)fst01110883
|
650 |
|
7 |
|a Software protection.
|2 fast
|0 (OCoLC)fst01124212
|
776 |
0 |
8 |
|i Print version:
|a Zdziarski, Jonathan A.
|t Hacking and securing iOS applications.
|b 1st ed.
|d Sebastopol, CA : O'Reilly Media, ©2012
|z 9781449318741
|w (DLC) 2012360962
|w (OCoLC)768796873
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781449325213/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21641499
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL843730
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10758616
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 432201
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7362740
|
938 |
|
|
|a Internet Archive
|b INAR
|n hackingsecuringi0000zdzi
|
994 |
|
|
|a 92
|b IZTAP
|