Cracking IPhone 3.0 Security - Charles Miller, Dino Dai Zovi, Ralf-Philipp Weinmann

Cracking IPhone 3.0 Security

Buch | Softcover
408 Seiten
2009
John Wiley & Sons Ltd (Verlag)
978-0-470-50252-5 (ISBN)
44,62 inkl. MwSt
  • Titel wird leider nicht erscheinen
  • Artikel merken
A guide to various aspects of protecting iPhone security. It shows security professionals exactly how to defend against 'bad' applications as well as new attacks. It outlines the techniques hackers use to attack the device. It provides an analysis of the iPhone's built-in security, security testing, enterprise iPhone deployment, and forensics.
This is the definitive guide to all aspects of protecting iPhone security. The exploding popularity of Apple's iPhone makes the device a top target for hackers, and the multitude of downloadable applications available from Apple's App Store greatly increases the risk. This much-needed guide shows security professionals exactly how to defend against 'bad' applications as well as new attacks. Written by two Mac and iPhone security experts, "Cracking iPhone Security" is the definitive guide to vulnerability issues for the most popular mobile phone platform. Recognizing that the iPhone is more like a computer than a traditional phone, it examines vulnerabilities such as buffer overflows, code execution exploits, and malware that takes advantage of the iPhone's unique features. You'll learn to defend against attacks as well as how to write more secure iPhone applications. This book is written by white-hat analysts who report vulnerabilities to Apple. It shows how to write secure iPhone applications and how to securely deploy and forensically examine Enterprise iPhones. It outlines the techniques hackers use to attack the device.
It provides in-depth analysis of the iPhone's built-in security, security testing, enterprise iPhone deployment, and forensics. It covers 2g and 3g iPhones and a future version of the iPhone hardware. It focuses on software security issues. "Cracking iPhone Security" arms the security professional with essential tools to combat iPhone hack attacks.

Charlie Miller is Principal Analyst at Independent Security Evaluators and formerly at the National Security Agency. He is best known for creating a remote exploit against the iPhone and discovering flaws in Samba, QuickTime and Safari as a white analyst alerting Apple. He won the Pwn2Own contest at CanSecWest 2008. Charlie has a Ph.D. from Notre Dame and has spoken frequently at Black Hat, DEFCON, ToorCon, ShmooCon, Hack in the Box,CanSecWest, and RSA. He is the author of two books, including Mac Hacker's Handbook. Dino Dai Zovi currently manages information security for a technology-based investment firm in New York City. Previously, he focused on penetration testing and red teaming with Matasano Security, Bloomberg's Attack and Exploitation Team, @stake, and the IDART Red Team at Sandia National Laboratories. He has presented at BlackHat, CanSecWest,Microsoft's BlueHat Security. He the author of two books, including co-author of Mac Hacker's Handbook. Ralf-Philipp Weinmann is a post-doctoral researcher at the LACS (Laboratory of Algorithms, Cryptology and Security) in the FSTC (Faculty of Sciences, Technology and Communication) of the University of Luxembourg. He did both his Diplom and his Ph.D. at the Technical University of Darmstadt in Germany. He is mostly interested in symmetric key cryptography and practical cryptanalysis of widely deployed algorithms. He also has a strong interest in the security of mobile devices and communications and enjoys reverse-engineering as a pastime.

Verlagsort Chichester
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Software Entwicklung Mobile- / App-Entwicklung
Informatik Weitere Themen Smartphones / Tablets
ISBN-10 0-470-50252-5 / 0470502525
ISBN-13 978-0-470-50252-5 / 9780470502525
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich