Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/ios-hacker-s-handbook/miller/descriptif_2625955
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=2625955

iOS Hacker's Handbook

Langue : Anglais

Auteurs :

Couverture de l’ouvrage iOS Hacker's Handbook
Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

  • Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
  • Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
  • Also examines kernel debugging and exploitation
  • Companion website includes source code and tools to facilitate your efforts

iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

Introduction xv

Chapter 1 iOS Security Basics 1

Chapter 2 iOS in the Enterprise 15

Chapter 3 Encryption 47

Chapter 4 Code Signing and Memory Protections 69

Chapter 5 Sandboxing 107

Chapter 6 Fuzzing iOS Applications 139

Chapter 7 Exploitation 185

Chapter 8 Return-Oriented Programming 219

Chapter 9 Kernel Debugging and Exploitation 249

Chapter 10 Jailbreaking 297

Chapter 11 Baseband Attacks 327

Appendix References 365

Index 369

Charlie Miller is Principal Research Consultant at Accuvant Labs and a four-time CanSecWest Pwn2Own winner.

Dionysus Blazakis is an expert on iOS and OS X sandbox security mechanisms.

Dino Dai Zovi is coauthor of The Mac Hacker's Handbook and a popular conference speaker.

Stefan Esser is a PHP security expert and leading researcher of iOS security topics.

Vincenzo Iozzo is an independent security researcher focused on Mac OS X and smartphones.

Ralf-Philipp Weinmann holds a PhD in cryptography and has an extensive security background.

Date de parution :

Ouvrage de 416 p.

18.8x23.4 cm

En stock : expédition en 24h !

43,25 €

Ajouter au panier

Thème d’iOS Hacker's Handbook :

Mots-clés :

iOS security, hacking iOS, jailbreaking, prevent iPhone attacks, prevent iOS attacks, iPhone security, hacking iPhone, hacking iPad, iOS security risks, iOS vulnerabilities, iOS exploits, books of hacking, software ios, software of hacking, apps and software, hacking touch, hacks software, apps hacks, books hacking, books for hacking, i touch application, data stealing, o apps, apps touch, hackers hand book, touch ios, apps o, network ios, jailbreak s, ios network, the latest apps, software for apps, ios jail breaking, books about hacking, games for ios, i touch hacks, hacking applications, apps an, i touch applications, ios touch event, the i touch, software for hacking, apps for news, apps software, ios 4.3 hack, 3gs ios, google apps ios, software apps, ios for 3gs, books on hacking, ios 3gs, i touch problems, ios on 3gs, apps for touch, cool ios apps, ios touch, jonathan zdziarski, apps ios, hacking passwords, apps for ios, google ios apps, touch apps, change gmail password, creating ios apps, ios applications, top ios apps, ios hacking tools, ios hack, jailbreaking apps, ios jailbreaking, hack ios 4.3, ios hacks, apps for hackers, hack ios, ios apps, jailbreak ios, how to hack iosm ios hacking, hacking ios 5, i touch apps, security in os, android and security, security ios, max os x 10.7, about the android, android security news, android security concerns, charlie miller fuzzing, computer security services, google android security, security android, app security, mobile app security, charlie miller pwn2own, ios security flaw, android security, os x security, independent security evaluators, ios security, charlie miller, ios security, ios vulnerability, ios encription, ios jailbreaks, encription, sandboxing, ipone fuzzing, rop payloads, rootkits, kemel, baseband attacks