[www.ed2k.online]下載基地為您提供軟件、遊戲、圖書、教育等各種資源的ED2K電驢共享下載和MAGNET磁力鏈接下載。
設為首頁
加入收藏
首頁 圖書資源 軟件資源 游戲資源 教育資源 其他資源
 電驢下載基地 >> 图书资源 >> 計算機與網絡 >> 《iOS黑客手冊》(iOS Hackers Handbook)英文文字版[EPUB]
《iOS黑客手冊》(iOS Hackers Handbook)英文文字版[EPUB]
下載分級 图书资源
資源類別 計算機與網絡
發布時間 2017/7/10
大       小 -
《iOS黑客手冊》(iOS Hackers Handbook)英文文字版[EPUB] 簡介: 中文名 : iOS黑客手冊 原名 : iOS Hacker's Handbook 作者 : Charlie Miller Dion Blazakis Dino DaiZovi Stefan Esser Vincenzo Iozzo Ralf-Philipp Weinmann 圖書分類 : 軟件 資源格式 : EPUB 版本 : 英文文字版 出版社 : Wiley 書號 : 1
電驢資源下載/磁力鏈接資源下載:
全選
"《iOS黑客手冊》(iOS Hackers Handbook)英文文字版[EPUB]"介紹
中文名: iOS黑客手冊
原名: iOS Hacker's Handbook
作者: Charlie Miller
Dion Blazakis
Dino DaiZovi
Stefan Esser
Vincenzo Iozzo
Ralf-Philipp Weinmann
圖書分類: 軟件
資源格式: EPUB
版本: 英文文字版
出版社: Wiley
書號: 1118204123
發行時間: 2012年5月8日
地區: 美國
語言: 英文
簡介:

內容介紹:
Discover all the security risks and exploits that can threaten iOS-based mobile devices
iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.
作者介紹:
Charlie Miller is Principal Research Consultant at Accuvant Labs and a four-time CanSecWest Pwn2Own winner.
Dionysus Blazakis is an expert on iOS and OS X sandbox security mechanisms.
Dino Dai Zovi is coauthor of The Mac Hacker's Handbook and a popular conference speaker.
Stefan Esser is a PHP security expert and leading researcher of iOS security topics.
Vincenzo Iozzo is an independent security researcher focused on Mac OS X and smartphones.
Ralf-Philipp Weinmann holds a PhD in cryptography and has an extensive security background.
內容截圖:

目錄:
Chapter 1 iOS Security Basics
Chapter 2 iOS in the Enterprise
Chapter 3 Encryption
Chapter 4 Code Signing and Memory Protections
Chapter 5 Sandboxing
Chapter 6 Fuzzing iOS Applications
Chapter 7 Exploitation
Chapter 8 Return-Oriented Programming
Chapter 9 Kernel Debugging and Exploitation
Chapter 10 Jailbreaking
Chapter 11 Baseband Attacks
Appendix References 
相關資源:

免責聲明:本網站內容收集於互聯網,本站不承擔任何由於內容的合法性及健康性所引起的爭議和法律責任。如果侵犯了你的權益,請通知我們,我們會及時刪除相關內容,謝謝合作! 聯系信箱:[email protected]

Copyright © 電驢下載基地 All Rights Reserved