IOS hacker's handbook:
"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--Page 4 of cover.
Saved in:
Other Authors: | |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Indianapolis, IN
Wiley
2012
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781118240755/?ar |
Summary: | "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--Page 4 of cover. |
Item Description: | Includes bibliographical references (pages 365-367) and index. - Print version record |
Physical Description: | 1 Online-Ressource (xx, 388 Seiten) illustrations |
ISBN: | 9781118204122 1118204123 9781118228432 111822843X 1283927853 9781283927857 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047531096 | ||
003 | DE-627-1 | ||
005 | 20240228115031.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2012 xx |||||o 00| ||eng c | ||
020 | |a 9781118204122 |9 978-1-118-20412-2 | ||
020 | |a 1118204123 |9 1-118-20412-3 | ||
020 | |a 9781118228432 |c e-book |9 978-1-118-22843-2 | ||
020 | |a 111822843X |c e-book |9 1-118-22843-X | ||
020 | |a 1283927853 |9 1-283-92785-3 | ||
020 | |a 9781283927857 |9 978-1-283-92785-7 | ||
035 | |a (DE-627-1)047531096 | ||
035 | |a (DE-599)KEP047531096 | ||
035 | |a (ORHE)9781118240755 | ||
035 | |a (DE-627-1)047531096 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a IOS hacker's handbook |c Charlie Miller [and others] |
264 | 1 | |a Indianapolis, IN |b Wiley |c 2012 | |
300 | |a 1 Online-Ressource (xx, 388 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (pages 365-367) and index. - Print version record | ||
520 | |a "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--Page 4 of cover. | ||
546 | |a English. | ||
630 | 2 | 0 | |a iOS (Electronic resource) |
650 | 0 | |a Operating systems (Computers) |x Security measures | |
650 | 0 | |a Application software |x Security measures | |
650 | 0 | |a Application software |x Development | |
650 | 4 | |a iOS (Electronic resource) | |
650 | 4 | |a Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures | |
650 | 4 | |a Logiciels d'application ; Sécurité ; Mesures | |
650 | 4 | |a Logiciels d'application ; Développement | |
650 | 4 | |a Application software ; Development | |
650 | 4 | |a Operating systems (Computers) ; Security measures | |
700 | 1 | |a Miller, Charles |d 1951- |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781118204122 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781118204122 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781118240755/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047531096 |
---|---|
_version_ | 1829007795234537472 |
adam_text | |
any_adam_object | |
author2 | Miller, Charles 1951- |
author2_role | ctb |
author2_variant | c m cm |
author_facet | Miller, Charles 1951- |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047531096 (DE-599)KEP047531096 (ORHE)9781118240755 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02347cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-047531096</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115031.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118204122</subfield><subfield code="9">978-1-118-20412-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1118204123</subfield><subfield code="9">1-118-20412-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781118228432</subfield><subfield code="c">e-book</subfield><subfield code="9">978-1-118-22843-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111822843X</subfield><subfield code="c">e-book</subfield><subfield code="9">1-118-22843-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283927853</subfield><subfield code="9">1-283-92785-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283927857</subfield><subfield code="9">978-1-283-92785-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047531096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047531096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781118240755</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047531096</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">IOS hacker's handbook</subfield><subfield code="c">Charlie Miller [and others]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 388 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 365-367) and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--Page 4 of cover.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">iOS (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Operating systems (Computers)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">iOS (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels d'application ; Développement</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers) ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Charles</subfield><subfield code="d">1951-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781118204122</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781118204122</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781118240755/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047531096 |
illustrated | Illustrated |
indexdate | 2025-04-10T09:35:58Z |
institution | BVB |
isbn | 9781118204122 1118204123 9781118228432 111822843X 1283927853 9781283927857 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xx, 388 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Wiley |
record_format | marc |
spelling | IOS hacker's handbook Charlie Miller [and others] Indianapolis, IN Wiley 2012 1 Online-Ressource (xx, 388 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references (pages 365-367) and index. - Print version record "The world loves iOS. Users love the convenience. Black hats love the vulnerability. This book arms you with the knowledge and tools to protect your organization's iOS devices. If you're a developer, it will also help you create hack-resistant applications."--Page 4 of cover. English. iOS (Electronic resource) Operating systems (Computers) Security measures Application software Security measures Application software Development Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures Logiciels d'application ; Sécurité ; Mesures Logiciels d'application ; Développement Application software ; Development Operating systems (Computers) ; Security measures Miller, Charles 1951- MitwirkendeR ctb 9781118204122 Erscheint auch als Druck-Ausgabe 9781118204122 |
spellingShingle | IOS hacker's handbook iOS (Electronic resource) Operating systems (Computers) Security measures Application software Security measures Application software Development Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures Logiciels d'application ; Sécurité ; Mesures Logiciels d'application ; Développement Application software ; Development Operating systems (Computers) ; Security measures |
title | IOS hacker's handbook |
title_auth | IOS hacker's handbook |
title_exact_search | IOS hacker's handbook |
title_full | IOS hacker's handbook Charlie Miller [and others] |
title_fullStr | IOS hacker's handbook Charlie Miller [and others] |
title_full_unstemmed | IOS hacker's handbook Charlie Miller [and others] |
title_short | IOS hacker's handbook |
title_sort | ios hacker s handbook |
topic | iOS (Electronic resource) Operating systems (Computers) Security measures Application software Security measures Application software Development Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures Logiciels d'application ; Sécurité ; Mesures Logiciels d'application ; Développement Application software ; Development Operating systems (Computers) ; Security measures |
topic_facet | iOS (Electronic resource) Operating systems (Computers) Security measures Application software Security measures Application software Development Systèmes d'exploitation (Ordinateurs) ; Sécurité ; Mesures Logiciels d'application ; Sécurité ; Mesures Logiciels d'application ; Développement Application software ; Development Operating systems (Computers) ; Security measures |
work_keys_str_mv | AT millercharles ioshackershandbook |