售价: ¥350.00 待定配送费
前翻 后翻
正在播放... 已暂停   您正在聆听的 Audible 音频版本的样品。
了解更多信息
查看全部 3 张图片

iOS Hacker's Handbook (英语) 平装 – 2012年5月8日

平均5.0 星 2 条商品评论
| 天天低价·正品质优
|
分享
广告

显示所有 格式和版本 隐藏其他格式和版本
亚马逊价格
全新品最低价 非全新品最低价
平装
"请重试"
¥350.00
¥350.00
促销信息: 优惠 买满 ¥99.00 立减 ¥10.00 共1个促销

 

书香假期,17万图书满100元30元,满200元80元:
活动期间内,领取优惠券,购买指定自营图书(不含电子书、第三方卖家商品、Z秒杀、Z实惠、镇店之宝、海外购或订购省商品),单笔订单参加活动商品金额满100元,在结账时系统将自动扣减30元;单笔订单参加活动商品金额满200元,在结账时系统将自动扣减80元。

click to open popover

商品促销和特殊优惠
  • 买满 ¥99.00 立减 ¥10.00: 满足条件自动优惠

无需Kindle设备,下载免费Kindle阅读软件,即可在您的手机、电脑及平板电脑上畅享阅读。

  • iPhone/iPad/Mac
  • Android手机或平板电脑

请输入您的手机号码,获取Kindle阅读软件的下载链接。



基本信息

  • 出版社: Wiley; 1 (2012年5月8日)
  • 平装: 408页
  • 语种: 英语
  • ISBN: 1118204123
  • 条形码: 9781118204122
  • 商品尺寸: 18.8 x 2.3 x 23.4 cm
  • 商品重量: 590 g
  • ASIN: 1118204123
  • 用户评分: 平均5.0 星 2 条商品评论
  • 亚马逊热销商品排名: 图书商品里排第511,912名 (查看图书商品销售排行榜)
  •  您想告诉我们您发现了更低的价格?

商品描述

作者简介

Charlie Miller is Principal Research Consultant at Accuvant Labs and a four-time CanSecWest Pwn2Own winner.

Dionysus Blazakis is an expert on iOS and OS X sandbox security mechanisms.

Dino Dai Zovi is coauthor of The Mac Hacker's Handbook and a popular conference speaker.

Stefan Esser is a PHP security expert and leading researcher of iOS security topics.

Vincenzo Iozzo is an independent security researcher focused on Mac OS X and smartphones.

Ralf-Philipp Weinmann holds a PhD in cryptography and has an extensive security background.

目录

Introduction xv

Chapter 1 iOS Security Basics 1

Chapter 2 iOS in the Enterprise 15

Chapter 3 Encryption 47

Chapter 4 Code Signing and Memory Protections 69

Chapter 5 Sandboxing 107

Chapter 6 Fuzzing iOS Applications 139

Chapter 7 Exploitation 185

Chapter 8 Return-Oriented Programming 219

Chapter 9 Kernel Debugging and Exploitation 249

Chapter 10 Jailbreaking 297

Chapter 11 Baseband Attacks 327

Appendix References 365

Index 369


看过此商品后顾客买的其它商品?

商品评论

平均5.0 星
5 星
2
4 星
0
3 星
0
2 星
0
1 星
0
查看两份评论
与其他用户分享您的观点

热门买家评论

评论者 turf 于 2012年12月27日
版本: 平装 已确认购买
书的内容是英文的,不过有英文功底的话建议看看,很不错的一本书!
回应 这条评论对您有用吗? 正在提交你的反馈。
感谢您的反馈。
很抱歉,我们没有记录您的投票。请重试
举报
评论者 MAZO 于 2013年9月8日
版本: 平装
如题。学习iOS系统必备好向导。
回应 这条评论对您有用吗? 正在提交你的反馈。
感谢您的反馈。
很抱歉,我们没有记录您的投票。请重试
举报

此商品在美国亚马逊上最有用的商品评论 (beta)

美国亚马逊: 平均3.9 星 27 条评论
9/11 人认为此评论有用
平均5.0 星 Excellent Review of the Concepts needed to Understand Jailbreaking 2012年5月9日
评论者 JRud - 已在美国亚马逊上发表
版本: 平装 已确认购买
I preordered this book so I have been reading it for about a week now. It is a wonderful book on security research for iOS devices. Don't expect to write a jailbreak for the newest devices after reading this book though, as that would require much experience in writing exploits, fuzzing, kernel debugging and ROP, which is completely understandable. It is foolish to believe that reading one book will allow you to write jailbreaks and find exploits with ease.

The book begins covering sandboxing, code signing and iOS enterprise applications, and their weaknesses. The chapter on fuzzing was very explanatory on the techniques used to do so. It covered fuzzing PDF and powerpoint documents in mobile safari, as well as SMS fuzzing. The next chapter talks about exploitation on iOS devices, focusing on heap exploits and in turn, memory allocation and deallocation.

The chapter on ROP explains what is capable and not capable with return oriented programming, and gives two great examples of such techniques. Following that is a chapter on kernel exploitation, describing how to reverse the IOKit kernel drivers and finding vulnerabilities, as well as how to exploit vulnerabilities once found. This chapter concludes with a demonstration on the heap fang shui technique used for heap buffer overflow exploits.

The jailbreaking chapter is not particularly long, but that is because the techniques used have been described in other parts of the book. This chapter examines the redsn0w jailbreak and describes each step performed by it, including the different kernel patches applied by the jailbreak.

The final chapter covers baseband hacking, which I have not read in detail yet. It appears, at first glance, to cover general knowledge on cell networks leading into the RTOS used on the baseband chips, and ending with a description of the ultrasn0w unlock.

Overall, I would recommend anyone who is interested in the techniques and steps used to find vulnerabilities and exploit them, leading to the development of a jailbreak for an iOS device.
5/7 人认为此评论有用
平均5.0 星 Excellent security overview of iOS 2012年5月17日
评论者 Prime - 已在美国亚马逊上发表
版本: 平装 已确认购买
I pre-ordered this book months ago, and got exactly what I was looking for: an in depth look at iOS security. It doesn't just talk about the present, but also takes a look at how far iOS has came since version 1. You'll find little details throughout that give you insight to some of the events and vulnerabilities that the authors (and others) were involved in. Great buy, especially if you're looking to learn more about mobile security.
8/11 人认为此评论有用
平均5.0 星 Great introduction 2012年5月11日
评论者 RichL - 已在美国亚马逊上发表
版本: 平装 已确认购买
You won't find a better introduction to iOS security than this book.
The authors manage to cover a variety of different subjects in enough detail to give you a good grounding in the iOS security model as well as the current state of vulnerability discovery on the platform.
16/21 人认为此评论有用
平均5.0 星 A good overview and source of inspiration 2012年5月3日
评论者 Reilly - 已在美国亚马逊上发表
版本: 平装 已确认购买
iOS Hacker's Handbook offers a good overview about the security mechanisms and possible strategies to overcome them.
The way current hacking techniques are being introduced, should enable less experienced programmers and enthusiast to get started and the more advanced reader will find a very well processed compendium (and more).

About the troll comments further down:
Some are obviously misinterpreting this book's intention. It's not about giving you a detailed tutorial on how to create a jailbreak, but to give a starting point, to introduce techniques needed and to motivate you to start learning and researching (btw. this belongs to security RESEARCH). Creating a jailbreak needs weeks and months of work, not to mention the vast experience and skills needed to pull of such a major task. One book can't accomplish that. So if you really want to become the next comex or pod2g: get off your backside, learn basics, read this book, read more materials, train your obtained skills and at the end of the road you might be able to develop your own exploits which will lead to a jailbreak.
0/3 人认为此评论有用
平均5.0 星 Just awesome, what a great book. 2012年7月7日
评论者 Guilherme - 已在美国亚马逊上发表
版本: 平装 已确认购买
This book is just great, it contains all the information necessary to develop iOS jailbreaks, but this book will not turn you into an i0n1c, musclenerd or pod2g overnight,of course a lot of knownledge will be necessary on the last chapters, but the first chapters are presented in a easy-to-understand language that almost anyone can perfectly understand, but of course, later on it will introduce you to ios basic jailbreaking tools, and of course it will get harder as you go through the whole book, but it's a really good challenge for anyone who wants to get introduced to the iOS jailbreaking world.