Please use this identifier to cite or link to this item: https://thuvienso.dau.edu.vn:88/handle/DHKTDN/6797
Full metadata record
DC FieldValueLanguage
dc.contributor.authorZdziarski, Jonathan-
dc.date.accessioned2015-01-14T08:18:55Z-
dc.date.available2015-01-14T08:18:55Z-
dc.date.issued2012-
dc.identifier.issn978-1-449-31874-1-
dc.identifier.urihttps://thuvienso.dau.edu.vn:88/handle/DHKTDN/6797-
dc.description.abstract1. Everything you know Is wrong; 2. The basics of compromising iOS; 3. Stealing the filesystem; 4. Forensic trace and data leakage; 5. Defeating encryption; 6. Unobliterating files; 7. Manipulating the runtime; 8. Abusing the runtime library; 9. Hijacking traffic; 10. Implementing encryption; 11. Counter forensics; 12. Securing the runtime; 13. Jailbreak detection; 14. Next steps.vi
dc.language.isoenvi
dc.publisherO’Reilly Media, Incvi
dc.subjectHackingvi
dc.subjectSecuringvi
dc.subjectiOS Applicationvi
dc.subjectSoftwarevi
dc.titleHacking and securing iOS applicationsvi
dc.typeBookvi
Appears in Collections:Ngoại Văn

Files in This Item:
File Description SizeFormat 
6171.Hacking and SecuringiOSApplications.pdf10.83 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.