LEADER 00000cam a2200949 a 4500 001 773567169 003 OCoLC 005 20240129213017.0 006 m o d 007 cr |n|---||||| 008 120123s2012 caua ob 000 0 eng d 010 2012360962 019 788498578|a815432698|a861530775|a968074083|a969025695 |a1066598869|a1103269244|a1113678360|a1129350407 |a1153035918|a1156105678|a1192339242|a1240536516 |a1285558936 020 9781449325244|q(electronic bk.) 020 1449325246|q(electronic bk.) 020 9781449325237|q(electronic bk.) 020 1449325238|q(electronic bk.) 020 |q(paper) 020 |q(paper) 024 8 9781449325213 029 1 AU@|b000049052937 029 1 DEBBG|bBV040901702 029 1 DEBSZ|b378290568 029 1 DEBSZ|b381377423 029 1 DEBSZ|b397231202 029 1 NZ1|b14520422 029 1 NZ1|b15176364 029 1 AU@|b000062625047 029 1 AU@|b000066230931 035 (OCoLC)773567169|z(OCoLC)788498578|z(OCoLC)815432698 |z(OCoLC)861530775|z(OCoLC)968074083|z(OCoLC)969025695 |z(OCoLC)1066598869|z(OCoLC)1103269244|z(OCoLC)1113678360 |z(OCoLC)1129350407|z(OCoLC)1153035918|z(OCoLC)1156105678 |z(OCoLC)1192339242|z(OCoLC)1240536516|z(OCoLC)1285558936 037 CL0500000134|bSafari Books Online 037 E01E57F6-A52D-45E1-BB47-A5B999338A37|bOverDrive, Inc. |nhttp://www.overdrive.com 040 EBLCP|beng|epn|cEBLCP|dXII|dUMI|dCOO|dN$T|dOCLCQ|dYDXCP |dWAU|dDEBSZ|dOCLCQ|dTEFOD|dOCLCQ|dOCLCF|dOCLCQ|dOCLCO |dE7B|dTEFOD|dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dFEM|dZ5A|dOCLCA |dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dMERER|dOCLCA|dBRL|dCEF |dOCLCQ|dTOF|dMOQ|dWYU|dOCLCO|dUAB|dAU@|dVT2|dUHL|dUKAHL |dOCLCQ|dUK7LJ|dINARC|dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dOCLCL 049 INap 082 04 005.26 082 04 005.26 099 eBook O’Reilly for Public Libraries 100 1 Zdziarski, Jonathan A. 245 10 Hacking and securing iOS applications /|cJonathan Zdziarski.|h[O'Reilly electronic resource] 250 1st ed. 260 Sebastopol :|bO'Reilly Media,|c©2012. 300 1 online resource (xv, 336 pages) :|billustrations 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 347 text file|2rda 504 Includes bibliographical references. 505 0 Everything You Know Is Wrong -- The Basics of Compromising iOS -- Stealing the Filesystem -- Forensic Trace and Data Leakage -- Defeating Encryption -- Unobliterating Files -- Manipulating the Runtime -- Abusing the Runtime Library -- Hijacking Traffic -- Implementing Encryption -- Counter Forensics -- Securing the Runtime -- Jailbreak Detection - - Next Steps. 520 "If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary"--Provided by publisher. 542 |fCopyright © O'Reilly Media, Inc.|g2012. 588 0 Print version record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 630 00 iOS (Electronic resource)|xSecurity measures. 630 07 IOS (Electronic resource) / Security measures.|2blmlsh 630 07 iOS (Electronic resource)|2fast 650 0 Application software|xDevelopment. 650 0 Objective-C (Computer program language) 650 0 Computer security. 650 0 Software protection. 650 2 Computer Security 650 6 Logiciels d'application|xDéveloppement. 650 6 Objective-C (Langage de programmation) 650 6 Sécurité informatique. 650 6 Logiciels|xProtection. 650 7 Application software|xDevelopment|2fast 650 7 Computer security|2fast 650 7 Objective-C (Computer program language)|2fast 650 7 Security systems|2fast 650 7 Software protection|2fast 776 08 |iPrint version:|aZdziarski, Jonathan A.|tHacking and securing iOS applications.|b1st ed.|dSebastopol, CA : O'Reilly Media, ©2012|z9781449318741|w(DLC) 2012360962 |w(OCoLC)768796873 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781449325213/?ar |zAvailable on O'Reilly for Public Libraries 938 Askews and Holts Library Services|bASKH|nAH21641499 938 ProQuest Ebook Central|bEBLB|nEBL843730 938 ebrary|bEBRY|nebr10758616 938 EBSCOhost|bEBSC|n432201 938 YBP Library Services|bYANK|n7362740 938 Internet Archive|bINAR|nhackingsecuringi0000zdzi 994 92|bJFN