iOS hacker's handbook

"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi rangatōpū: ebrary, Inc
Ētahi atu kaituhi: Miller, Charles, 1951-
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Indianapolis, Ind. : Wiley, c2012.
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!
Rārangi ihirangi:
  • iOS security basics
  • iOS in the enterprise
  • Encryption
  • Code signing and memory protections
  • Sanboxing
  • Fuzzing iOS applications
  • Exploitation
  • Return-oriented programming
  • Kernel debugging and exploitation
  • Jailbreaking
  • Baseband attacks.