Cargando…

IOS application security : the definitive guide for hackers and developers /

IOS Application Security covers everything you need to know to design secure iOS apps from the ground up and keep users' data safe.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Thiel, David, 1980- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco, CA : No Starch Press, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_ocn944248696
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 160310s2016 caua o 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d YDXCP  |d TEFOD  |d UMI  |d EBLCP  |d DEBBG  |d K6U  |d IDB  |d OCLCQ  |d OCLCO  |d LIV  |d IDEBK  |d RECBK  |d OCLCQ  |d MERUC  |d ESU  |d OCLCQ  |d OCLCO  |d RRP  |d VT2  |d COO  |d D6H  |d HCO  |d VVB  |d GILDS  |d OCLCF  |d FMG  |d UOK  |d CEF  |d STF  |d AU@  |d C6I  |d UAB  |d RDF  |d UKAHL  |d OCLCQ  |d OCLCO  |d MERER  |d VLY  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d UKUOP  |d HS0  |d EYM  |d SOE  |d OCLCO  |d OCLCQ  |d OCLCO  |d CZL  |d DST  |d OCLCO  |d SGP  |d KSU  |d UPM  |d LNS  |d SHC  |d TOH  |d OCLCQ 
066 |c (N  |c (Q 
019 |a 939555350  |a 1058199964  |a 1097096804 
020 |a 9781593277543  |q (electronic bk.) 
020 |a 1593277547  |q (electronic bk.) 
020 |a 9781593276010  |q (electronic bk.) 
020 |a 159327601X  |q (electronic bk.) 
020 |a 9781457198830 
020 |a 1457198835 
029 1 |a DEBBG  |b BV043968942 
029 1 |a DEBSZ  |b 485794543 
029 1 |a GBVCP  |b 882753290 
029 1 |a CHVBK  |b 503257273 
029 1 |a CHNEW  |b 000973494 
035 |a (OCoLC)944248696  |z (OCoLC)939555350  |z (OCoLC)1058199964  |z (OCoLC)1097096804 
037 |a 78044D0F-A2E1-4559-BFCA-B80583B830D7  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 013000  |2 bisacsh 
072 7 |a COM  |x 014000  |2 bisacsh 
072 7 |a COM  |x 018000  |2 bisacsh 
072 7 |a COM  |x 067000  |2 bisacsh 
072 7 |a COM  |x 032000  |2 bisacsh 
072 7 |a COM  |x 037000  |2 bisacsh 
072 7 |a COM  |x 052000  |2 bisacsh 
082 0 4 |a 004  |2 23 
049 |a UAMI 
100 1 |a Thiel, David,  |d 1980-  |e author. 
245 1 0 |a IOS application security :  |b the definitive guide for hackers and developers /  |c by David Thiel. 
264 1 |a San Francisco, CA :  |b No Starch Press,  |c [2016] 
264 4 |c ©2016 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a About the Author ; About the Technical Reviewer ; Brief Contents ; Contents in Detail ; Foreword by Alex Stamos ; Acknowledgments ; Introduction ; Who This Book Is For ; What's in This Book ; How This Book Is Structured ; Conventions This Book Follows ; A Note on Swift ; Mobile Security Promises and Threats ; What Mobile Apps Shouldn't Be Able to Do ; Classifying Mobile Security Threats in This Book ; Some Notes for iOS Security Testers ; Part I: iOS Fundamentals ; Chapter 1: The iOS Security Model ; Secure Boot ; Limiting Access with the App Sandbox. 
505 8 |a Data Protection and Full-Disk Encryption The Encryption Key Hierarchy ; The Keychain API ; The Data Protection API ; Native Code Exploit Mitigations: ASLR, XN, and Friends ; Jailbreak Detection ; How Effective Is App Store Review? ; Bridging from WebKit ; Dynamic Patching; Intentionally Vulnerable Code ; Embedded Interpreters ; Closing Thoughts ; Chapter 2: Objective-C for the Lazy ; Key iOS Programming Technology ; Passing Messages ; Dissecting an Objective-C Program ; Declaring an Interface ; Inside an Implementation File ; Specifying Callbacks with Blocks ; How Objective-C Manages Memory. 
505 8 |a Automatic Reference Counting Delegates and Protocols ; Should Messages ; Will Messages ; Did Messages ; Declaring and Conforming to Protocols ; The Dangers of Categories ; Method Swizzling ; Closing Thoughts ; Chapter 3: iOS Application Anatomy ; Dealing with plist Files ; Device Directories ; The Bundle Directory ; The Data Directory ; The Documents and Inbox Directories ; The Library Directory ; The tmp Directory ; The Shared Directory ; Closing Thoughts ; Part II: Security Testing ; Chapter 4: Building Your Test Platform ; Taking Off the Training Wheels ; Suggested Testing Devices. 
505 8 |a Testing with a Device vs. Using a Simulator Network and Proxy Setup ; Bypassing TLS Validation ; Bypassing SSL with stunnel ; Certificate Management on a Device ; Proxy Setup on a Device ; Xcode and Build Setup ; Make Life Difficult ; Enabling Full ASLR ; Clang and Static Analysis ; Address Sanitizer and Dynamic Analysis ; Monitoring Programs with Instruments ; Activating Instruments ; Watching Filesystem Activity with Watchdog ; Closing Thoughts ; Chapter 5: Debugging with lldb and Friends ; Useful Features in lldb ; Working with Breakpoints ; Navigating Frames and Variables. 
505 8 |a Visually Inspecting Objects Manipulating Variables and Properties ; Breakpoint Actions ; Using llbd for Security Analysis ; Fault Injection ; Tracing Data ; Examining Core Frameworks ; Closing Thoughts ; Chapter 6: Black-Box Testing ; Installing Third-Party Apps ; Using a .app Directory ; Using a .ipa Package File ; Decrypting Binaries ; Launching the debugserver on the Device ; Locating the Encrypted Segment ; Dumping Application Memory ; Reverse Engineering from Decrypted Binaries ; Inspecting Binaries with otool; Obtaining Class Information with class-dump. 
520 |6 880-01  |a IOS Application Security covers everything you need to know to design secure iOS apps from the ground up and keep users' data safe. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a iOS (Electronic resource) 
630 0 7 |a IOS (Electronic resource)  |2 fast  |0 (OCoLC)fst01784820 
650 0 |a Mobile computing  |x Security measures. 
650 0 |a iPhone (Smartphone)  |x Mobile apps  |x Security measures. 
650 0 |a iPad (Computer)  |x Security measures. 
650 0 |a Application software  |x Development. 
650 0 |a Objective-C (Computer program language) 
650 6 |a Informatique mobile  |x Sécurité  |x Mesures. 
650 6 |a iPad (Ordinateur)  |x Sécurité  |x Mesures. 
650 6 |a Logiciels d'application  |x Développement. 
650 6 |a Objective-C (Langage de programmation) 
650 7 |a COMPUTERS  |x Computer Literacy.  |2 bisacsh 
650 7 |a COMPUTERS  |x Computer Science.  |2 bisacsh 
650 7 |a COMPUTERS  |x Data Processing.  |2 bisacsh 
650 7 |a COMPUTERS  |x Hardware  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a COMPUTERS  |x Machine Theory.  |2 bisacsh 
650 7 |a COMPUTERS  |x Reference.  |2 bisacsh 
650 7 |a Application software  |x Development.  |2 fast  |0 (OCoLC)fst00811707 
650 7 |a Objective-C (Computer program language)  |2 fast  |0 (OCoLC)fst01747074 
776 0 8 |i Print version:  |a Thiel, David, 1980-  |t IOS application security  |z 9781593276010  |w (OCoLC)939555350 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781457198830/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
880 |6 520-01/(Q  |a Whether youѫre looking to bolster your аррѫs defenses or hunting bugs in other peoplеѫs code, this expert guide reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them. --  |c Edited summary from book. 
938 |a YBP Library Services  |b YANK  |n 12866500 
938 |a Recorded Books, LLC  |b RECE  |n rbeEB00710008 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34092108 
938 |a EBSCOhost  |b EBSC  |n 1190999 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33086864 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL6059155 
938 |a Internet Archive  |b INAR  |n iosapplicationse0000thie 
994 |a 92  |b IZTAP