Please use this identifier to cite or link to this item:
https://thuvienso.dau.edu.vn:88/handle/DHKTDN/6797
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zdziarski, Jonathan | - |
dc.date.accessioned | 2015-01-14T08:18:55Z | - |
dc.date.available | 2015-01-14T08:18:55Z | - |
dc.date.issued | 2012 | - |
dc.identifier.issn | 978-1-449-31874-1 | - |
dc.identifier.uri | https://thuvienso.dau.edu.vn:88/handle/DHKTDN/6797 | - |
dc.description.abstract | 1. Everything you know Is wrong; 2. The basics of compromising iOS; 3. Stealing the filesystem; 4. Forensic trace and data leakage; 5. Defeating encryption; 6. Unobliterating files; 7. Manipulating the runtime; 8. Abusing the runtime library; 9. Hijacking traffic; 10. Implementing encryption; 11. Counter forensics; 12. Securing the runtime; 13. Jailbreak detection; 14. Next steps. | vi |
dc.language.iso | en | vi |
dc.publisher | O’Reilly Media, Inc | vi |
dc.subject | Hacking | vi |
dc.subject | Securing | vi |
dc.subject | iOS Application | vi |
dc.subject | Software | vi |
dc.title | Hacking and securing iOS applications | vi |
dc.type | Book | vi |
Appears in Collections: | Ngoại Văn |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
6171.Hacking and SecuringiOSApplications.pdf | 10.83 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.