Description |
xx, 388 p. : ill. |
Bibliography |
Includes bibliographical references (p. 365-367) and index. |
Contents |
iOS security basics -- iOS in the enterprise -- Encryption -- Code signing and memory protections -- Sanboxing -- Fuzzing iOS applications -- Exploitation -- Return-oriented programming -- Kernel debugging and exploitation -- Jailbreaking -- Baseband attacks. |
Summary |
"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--P. [4] of cover-- Source other than Library of Congress. |
Reproduction |
Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. |
Subject |
iOS (Electronic resource)
|
|
Operating systems (Computers) -- Security measures.
|
|
Application software -- Security measures.
|
|
Application software -- Development.
|
Genre/Form |
Electronic books.
|
Added Author |
Miller, Charles, 1951-
|
|
ProQuest (Firm)
|
ISBN |
9781118204122 (pbk.) |
|
1118204123 (pbk.) |
|
9781118228432 (electronic bk.) |
|