Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200949 a 4500 
001    773567169 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr |n|---||||| 
008    120123s2012    caua    ob    000 0 eng d 
010      2012360962 
019    788498578|a815432698|a861530775|a968074083|a969025695
       |a1066598869|a1103269244|a1113678360|a1129350407
       |a1153035918|a1156105678|a1192339242|a1240536516
       |a1285558936 
020    9781449325244|q(electronic bk.) 
020    1449325246|q(electronic bk.) 
020    9781449325237|q(electronic bk.) 
020    1449325238|q(electronic bk.) 
020    |q(paper) 
020    |q(paper) 
024 8  9781449325213 
029 1  AU@|b000049052937 
029 1  DEBBG|bBV040901702 
029 1  DEBSZ|b378290568 
029 1  DEBSZ|b381377423 
029 1  DEBSZ|b397231202 
029 1  NZ1|b14520422 
029 1  NZ1|b15176364 
029 1  AU@|b000062625047 
029 1  AU@|b000066230931 
035    (OCoLC)773567169|z(OCoLC)788498578|z(OCoLC)815432698
       |z(OCoLC)861530775|z(OCoLC)968074083|z(OCoLC)969025695
       |z(OCoLC)1066598869|z(OCoLC)1103269244|z(OCoLC)1113678360
       |z(OCoLC)1129350407|z(OCoLC)1153035918|z(OCoLC)1156105678
       |z(OCoLC)1192339242|z(OCoLC)1240536516|z(OCoLC)1285558936 
037    CL0500000134|bSafari Books Online 
037    E01E57F6-A52D-45E1-BB47-A5B999338A37|bOverDrive, Inc.
       |nhttp://www.overdrive.com 
040    EBLCP|beng|epn|cEBLCP|dXII|dUMI|dCOO|dN$T|dOCLCQ|dYDXCP
       |dWAU|dDEBSZ|dOCLCQ|dTEFOD|dOCLCQ|dOCLCF|dOCLCQ|dOCLCO
       |dE7B|dTEFOD|dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dFEM|dZ5A|dOCLCA
       |dOCLCQ|dOCLCO|dOCLCQ|dOCLCO|dMERER|dOCLCA|dBRL|dCEF
       |dOCLCQ|dTOF|dMOQ|dWYU|dOCLCO|dUAB|dAU@|dVT2|dUHL|dUKAHL
       |dOCLCQ|dUK7LJ|dINARC|dOCLCO|dOCLCQ|dOCLCO|dOCLCQ|dOCLCL 
049    INap 
082 04 005.26 
082 04 005.26 
099    eBook O’Reilly for Public Libraries 
100 1  Zdziarski, Jonathan A. 
245 10 Hacking and securing iOS applications /|cJonathan 
       Zdziarski.|h[O'Reilly electronic resource] 
250    1st ed. 
260    Sebastopol :|bO'Reilly Media,|c©2012. 
300    1 online resource (xv, 336 pages) :|billustrations 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file|2rda 
504    Includes bibliographical references. 
505 0  Everything You Know Is Wrong -- The Basics of Compromising
       iOS -- Stealing the Filesystem -- Forensic Trace and Data 
       Leakage -- Defeating Encryption -- Unobliterating Files --
       Manipulating the Runtime -- Abusing the Runtime Library --
       Hijacking Traffic -- Implementing Encryption -- Counter 
       Forensics -- Securing the Runtime -- Jailbreak Detection -
       - Next Steps. 
520    "If you're an app developer with a solid foundation in 
       Objective-C, this book is an absolute must--chances are 
       very high that your company's iOS applications are 
       vulnerable to attack. That's because malicious attackers 
       now use an arsenal of tools to reverse-engineer, trace, 
       and manipulate applications in ways that most programmers 
       aren't aware of. This guide illustrates several types of 
       iOS attacks, as well as the tools and techniques that 
       hackers use. You'll learn best practices to help protect 
       your applications, and discover how important it is to 
       understand and strategize like your adversary"--Provided 
       by publisher. 
542    |fCopyright © O'Reilly Media, Inc.|g2012. 
588 0  Print version record. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
630 00 iOS (Electronic resource)|xSecurity measures. 
630 07 IOS (Electronic resource) / Security measures.|2blmlsh 
630 07 iOS (Electronic resource)|2fast 
650  0 Application software|xDevelopment. 
650  0 Objective-C (Computer program language) 
650  0 Computer security. 
650  0 Software protection. 
650  2 Computer Security 
650  6 Logiciels d'application|xDéveloppement. 
650  6 Objective-C (Langage de programmation) 
650  6 Sécurité informatique. 
650  6 Logiciels|xProtection. 
650  7 Application software|xDevelopment|2fast 
650  7 Computer security|2fast 
650  7 Objective-C (Computer program language)|2fast 
650  7 Security systems|2fast 
650  7 Software protection|2fast 
776 08 |iPrint version:|aZdziarski, Jonathan A.|tHacking and 
       securing iOS applications.|b1st ed.|dSebastopol, CA : 
       O'Reilly Media, ©2012|z9781449318741|w(DLC)  2012360962
       |w(OCoLC)768796873 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781449325213/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH21641499 
938    ProQuest Ebook Central|bEBLB|nEBL843730 
938    ebrary|bEBRY|nebr10758616 
938    EBSCOhost|bEBSC|n432201 
938    YBP Library Services|bYANK|n7362740 
938    Internet Archive|bINAR|nhackingsecuringi0000zdzi 
994    92|bJFN