Cracking IPhone 3.0 Security
John Wiley & Sons Ltd (Verlag)
978-0-470-50252-5 (ISBN)
- Titel wird leider nicht erscheinen
- Artikel merken
This is the definitive guide to all aspects of protecting iPhone security. The exploding popularity of Apple's iPhone makes the device a top target for hackers, and the multitude of downloadable applications available from Apple's App Store greatly increases the risk. This much-needed guide shows security professionals exactly how to defend against 'bad' applications as well as new attacks. Written by two Mac and iPhone security experts, "Cracking iPhone Security" is the definitive guide to vulnerability issues for the most popular mobile phone platform. Recognizing that the iPhone is more like a computer than a traditional phone, it examines vulnerabilities such as buffer overflows, code execution exploits, and malware that takes advantage of the iPhone's unique features. You'll learn to defend against attacks as well as how to write more secure iPhone applications. This book is written by white-hat analysts who report vulnerabilities to Apple. It shows how to write secure iPhone applications and how to securely deploy and forensically examine Enterprise iPhones. It outlines the techniques hackers use to attack the device.
It provides in-depth analysis of the iPhone's built-in security, security testing, enterprise iPhone deployment, and forensics. It covers 2g and 3g iPhones and a future version of the iPhone hardware. It focuses on software security issues. "Cracking iPhone Security" arms the security professional with essential tools to combat iPhone hack attacks.
Charlie Miller is Principal Analyst at Independent Security Evaluators and formerly at the National Security Agency. He is best known for creating a remote exploit against the iPhone and discovering flaws in Samba, QuickTime and Safari as a white analyst alerting Apple. He won the Pwn2Own contest at CanSecWest 2008. Charlie has a Ph.D. from Notre Dame and has spoken frequently at Black Hat, DEFCON, ToorCon, ShmooCon, Hack in the Box,CanSecWest, and RSA. He is the author of two books, including Mac Hacker's Handbook. Dino Dai Zovi currently manages information security for a technology-based investment firm in New York City. Previously, he focused on penetration testing and red teaming with Matasano Security, Bloomberg's Attack and Exploitation Team, @stake, and the IDART Red Team at Sandia National Laboratories. He has presented at BlackHat, CanSecWest,Microsoft's BlueHat Security. He the author of two books, including co-author of Mac Hacker's Handbook. Ralf-Philipp Weinmann is a post-doctoral researcher at the LACS (Laboratory of Algorithms, Cryptology and Security) in the FSTC (Faculty of Sciences, Technology and Communication) of the University of Luxembourg. He did both his Diplom and his Ph.D. at the Technical University of Darmstadt in Germany. He is mostly interested in symmetric key cryptography and practical cryptanalysis of widely deployed algorithms. He also has a strong interest in the security of mobile devices and communications and enjoys reverse-engineering as a pastime.
Verlagsort | Chichester |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Software Entwicklung ► Mobile- / App-Entwicklung | |
Informatik ► Weitere Themen ► Smartphones / Tablets | |
ISBN-10 | 0-470-50252-5 / 0470502525 |
ISBN-13 | 978-0-470-50252-5 / 9780470502525 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich