did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470502525

Cracking iPhone 3.0 Security

by ; ;
  • ISBN13:

    9780470502525

  • ISBN10:

    0470502525

  • Format: Paperback
  • Copyright: 2010-01-01
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99
We're Sorry.
No Options Available at This Time.

Summary

The definitive guide to all aspects of protecting iPhone securityThe exploding popularity of Apple's iPhone makes the device a top target for hackers, and the multitude of downloadable applications available from Apple's App Store greatly increases the risk. This much-needed guide shows security professionals exactly how to defend against "bad" applications as well as new attacks.Written by two Mac and iPhone security experts, Cracking iPhone Security is the definitive guide to vulnerability issues for the most popular mobile phone platform. Recognizing that the iPhone is more like a computer than a traditional phone, it examines vulnerabilities such as buffer overflows, code execution exploits, and malware that takes advantage of the iPhone's unique features. You'll learn to defend against attacks as well as how to write more secure iPhone applications. Written by white-hat analysts who report vulnerabilities to Apple Shows how to write secure iPhone applications and how to securely deploy and forensically examine Enterprise iPhones Outlines the techniques hackers use to attack the device Provides in-depth analysis of the iPhone's built-in security, security testing, enterprise iPhone deployment, and forensics Covers 2g and 3g iPhones and a future version of the iPhone hardware Focuses on software security issuesCracking iPhone Security arms the security professional with essential tools to combat iPhone hack attacks.

Author Biography

Charlie Miller is Principal Analyst at Independent Security Evaluators and formerly at the National Security Agency. He is best known for creating a remote exploit against the iPhone and discovering flaws in Samba, QuickTime and Safari as a white analyst alerting Apple. He won the Pwn2Own contest at CanSecWest 2008. Charlie has a Ph.D. from Notre Dame and has spoken frequently at Black Hat, DEFCON, ToorCon, ShmooCon, Hack in the Box,CanSecWest, and RSA. He is the author of two books, including Mac Hacker’s Handbook.

Dino Dai Zovi currently manages information security for a technology-based investment firm in New York City. Previously, he focused on penetration testing and red teaming with Matasano Security, Bloomberg's Attack and Exploitation Team, @stake, and the IDART Red Team at Sandia National Laboratories. He has presented at BlackHat, CanSecWest,Microsoft's BlueHat Security. He the author of two books, including co-author of Mac Hacker’s Handbook.

Ralf-Philipp Weinmann is a post-doctoral researcher at the LACS (Laboratory of Algorithms, Cryptology and Security) in the FSTC (Faculty of Sciences, Technology and Communication) of the University of Luxembourg. He did both his Diplom and his Ph.D. at the Technical University of Darmstadt in Germany. He is mostly interested in symmetric key cryptography and practical cryptanalysis of widely deployed algorithms. He also has a strong interest in the security of mobile devices and communications and enjoys reverse-engineering as a pastime.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program