Check nearby libraries
Buy this book

"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--
Check nearby libraries
Buy this book

Edition | Availability |
---|---|
1 |
zzzz
|
2 |
zzzz
|
3 |
zzzz
|
4 |
aaaa
|
5 |
zzzz
|
Book Details
Table of Contents
iOS security basics
iOS in the enterprise
Encryption
Code signing and memory protections
Sanboxing
Fuzzing iOS applications
Exploitation
Return-oriented programming
Kernel debugging and exploitation
Jailbreaking
Baseband attacks.
Edition Notes
Includes bibliographical references (p. 365-367) and index.
Classifications
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created July 18, 2012
- 6 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
March 28, 2025 | Edited by ImportBot | Redacting ocaids |
November 13, 2020 | Edited by MARC Bot | import existing book |
October 9, 2020 | Edited by ImportBot | import existing book |
August 2, 2020 | Edited by ImportBot | import existing book |
July 18, 2012 | Created by LC Bot | Imported from Library of Congress MARC record |