Blazakis, Dion

iOS Hacker's Handbook

Blazakis, Dion - iOS Hacker's Handbook, ebook


Ebook, PDF with Adobe DRM
ISBN: 9781118228432
DRM Restrictions

Printing115 pages with an additional page accrued every 7 hours, capped at 115 pages
Copy to clipboard5 excerpts

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

  • Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
  • Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
  • Also examines kernel debugging and exploitation
  • Companion website includes source code and tools to facilitate your efforts

iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

Keywords: Networking / Security, iOS security, hacking iOS, jailbreaking, prevent iPhone attacks, prevent iOS attacks, iPhone security, hacking iPhone, hacking iPad, iOS security risks, iOS vulnerabilities, iOS exploits, books of hacking, software ios, software of hacking, apps and software, hacking touch, hacks software, apps hacks, books hacking, books for hacking, i touch application, data stealing, o apps, apps touch, hackers hand book, touch ios, apps o, network ios, jailbreak ios network, the latest apps, software for apps, ios jail breaking, books about hacking, games for ios, i touch hacks, hacking applications, apps an, i touch applications, ios touch event, the i touch, software for hacking, apps for news, apps software, ios 4.3 hack, 3gs ios, google apps ios, software apps, ios for 3gs, books on hacking, ios 3gs, i touch problems, ios on 3gs, apps for touch, cool ios apps, ios touch, jonathan zdziarski, apps ios, hacking passwords, apps for ios, google ios apps, touch apps, change gmail password, creating ios apps, ios applications, top ios apps, ios hacking tools, ios hack, jailbreaking apps, ios jailbreaking, hack ios 4.3, ios hacks, apps for hackers, hack ios, ios apps, jailbreak ios, how to hack iosm ios hacking, hacking ios 5, i touch apps, security in os, android and security, security ios, max os x 10.7, about the android, android security news, android security concerns, charlie miller fuzzing, computer security services, google android security, security android, app security, mobile app security, charlie miller pwn2own, ios security flaw, android security, os x security, independent security evaluators, ios security, charlie miller, ios security, ios vulnerability, ios encription, ios jailbreaks, encription, sandboxing, ipone fuzzing, rop payloads, rootkits, kemel, baseband attacks

John Wiley and Sons, Inc.
Publication year
Page amount
384 pages
Information Technology, Telecommunications
Printed ISBN

Similar titles