Check nearby libraries
Buy this book

"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover--
Check nearby libraries
Buy this book

Edition | Availability |
---|---|
1 |
zzzz
|
2 |
zzzz
|
3 |
aaaa
|
4 |
zzzz
|
5 |
zzzz
|
Book Details
Table of Contents
iOS security basics
iOS in the enterprise
Encryption
Code signing and memory protections
Sanboxing
Fuzzing iOS applications
Exploitation
Return-oriented programming
Kernel debugging and exploitation
Jailbreaking
Baseband attacks.
Edition Notes
Includes bibliographical references (p. 365-367) and index.
Classifications
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
September 8, 2024 | Edited by Zora Elbe | Merge works |
August 2, 2020 | Edited by ImportBot | import existing book |
July 1, 2019 | Edited by MARC Bot | import existing book |
July 18, 2012 | Created by LC Bot | import new book |