Kindle 端末は必要ありません。無料 Kindle アプリのいずれかをダウンロードすると、スマートフォン、タブレットPCで Kindle 本をお読みいただけます。

  • Apple
  • Android
  • Windows Phone
  • Android

無料アプリを入手するには、Eメールアドレスを入力してください。

Kindle 価格: ¥ 4,587

¥ 798の割引 (15%)

ポイント : 1810pt (39%)

これらのプロモーションはこの商品に適用されます:

Kindle または他の端末に配信

Kindle または他の端末に配信

[Miller, Charlie, Blazakis, Dion, DaiZovi, Dino, Esser, Stefan, Iozzo, Vincenzo, Weinmann, Ralf-Philip]のiOS Hacker's Handbook
Kindle App Ad

iOS Hacker's Handbook 1 , Kindle版


その他(2)の形式およびエディションを表示する 他のフォーマットおよびエディションを非表示にする
Amazon 価格
新品 中古品
Kindle版
"もう一度試してください。"
¥ 4,587
【買取サービス】 Amazonアカウントを使用して簡単お申し込み。売りたいと思った時に、宅配買取もしくは出張買取を選択してご利用いただけます。 今すぐチェック。


商品の説明

内容紹介

Discover all the security risks and exploits that can threaten iOS-based mobile devices

iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.

  • Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work
  • Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks
  • Also examines kernel debugging and exploitation
  • Companion website includes source code and tools to facilitate your efforts

iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.

著者について

Charlie Miller is Principal Research Consultant at Accuvant Labs and a four-time CanSecWest Pwn2Own winner.

Dionysus Blazakis is an expert on iOS and OS X sandbox security mechanisms.

Dino Dai Zovi is coauthor of The Mac Hacker's Handbook and a popular conference speaker.

Stefan Esser is a PHP security expert and leading researcher of iOS security topics.

Vincenzo Iozzo is an independent security researcher focused on Mac OS X and smartphones.

Ralf-Philipp Weinmann holds a PhD in cryptography and has an extensive security background.


登録情報

  • フォーマット: Kindle版
  • ファイルサイズ: 3882 KB
  • 紙の本の長さ: 408 ページ
  • 出版社: Wiley; 1版 (2012/4/30)
  • 販売: Amazon Services International, Inc.
  • 言語: 英語
  • ASIN: B00888KNL2
  • Text-to-Speech(テキスト読み上げ機能): 有効
  • X-Ray:
  • Word Wise: 有効にされていません
  • おすすめ度: この商品の最初のレビューを書き込んでください。
  • Amazon 売れ筋ランキング:
  • さらに安い価格について知らせる

カスタマーレビュー

Amazon.co.jp にはまだカスタマーレビューはありません
星5つ
星4つ
星3つ
星2つ
星1つ

Amazon.com で最も参考になったカスタマーレビュー (beta) (「Early Reviewer Program」のレビューが含まれている場合があります)

Amazon.com: 5つ星のうち 3.8 27 件のカスタマーレビュー
11 人中、9人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 5.0 Excellent Review of the Concepts needed to Understand Jailbreaking 2012/5/9
投稿者 JRud - (Amazon.com)
形式: ペーパーバック Amazonで購入
I preordered this book so I have been reading it for about a week now. It is a wonderful book on security research for iOS devices. Don't expect to write a jailbreak for the newest devices after reading this book though, as that would require much experience in writing exploits, fuzzing, kernel debugging and ROP, which is completely understandable. It is foolish to believe that reading one book will allow you to write jailbreaks and find exploits with ease.

The book begins covering sandboxing, code signing and iOS enterprise applications, and their weaknesses. The chapter on fuzzing was very explanatory on the techniques used to do so. It covered fuzzing PDF and powerpoint documents in mobile safari, as well as SMS fuzzing. The next chapter talks about exploitation on iOS devices, focusing on heap exploits and in turn, memory allocation and deallocation.

The chapter on ROP explains what is capable and not capable with return oriented programming, and gives two great examples of such techniques. Following that is a chapter on kernel exploitation, describing how to reverse the IOKit kernel drivers and finding vulnerabilities, as well as how to exploit vulnerabilities once found. This chapter concludes with a demonstration on the heap fang shui technique used for heap buffer overflow exploits.

The jailbreaking chapter is not particularly long, but that is because the techniques used have been described in other parts of the book. This chapter examines the redsn0w jailbreak and describes each step performed by it, including the different kernel patches applied by the jailbreak.

The final chapter covers baseband hacking, which I have not read in detail yet. It appears, at first glance, to cover general knowledge on cell networks leading into the RTOS used on the baseband chips, and ending with a description of the ultrasn0w unlock.

Overall, I would recommend anyone who is interested in the techniques and steps used to find vulnerabilities and exploit them, leading to the development of a jailbreak for an iOS device.
7 人中、5人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 5.0 Excellent security overview of iOS 2012/5/17
投稿者 Prime - (Amazon.com)
形式: ペーパーバック Amazonで購入
I pre-ordered this book months ago, and got exactly what I was looking for: an in depth look at iOS security. It doesn't just talk about the present, but also takes a look at how far iOS has came since version 1. You'll find little details throughout that give you insight to some of the events and vulnerabilities that the authors (and others) were involved in. Great buy, especially if you're looking to learn more about mobile security.
11 人中、8人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 5.0 Great introduction 2012/5/11
投稿者 RichL - (Amazon.com)
形式: ペーパーバック Amazonで購入
You won't find a better introduction to iOS security than this book.
The authors manage to cover a variety of different subjects in enough detail to give you a good grounding in the iOS security model as well as the current state of vulnerability discovery on the platform.
21 人中、16人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 5.0 A good overview and source of inspiration 2012/5/3
投稿者 Reilly - (Amazon.com)
形式: ペーパーバック Amazonで購入
iOS Hacker's Handbook offers a good overview about the security mechanisms and possible strategies to overcome them.
The way current hacking techniques are being introduced, should enable less experienced programmers and enthusiast to get started and the more advanced reader will find a very well processed compendium (and more).

About the troll comments further down:
Some are obviously misinterpreting this book's intention. It's not about giving you a detailed tutorial on how to create a jailbreak, but to give a starting point, to introduce techniques needed and to motivate you to start learning and researching (btw. this belongs to security RESEARCH). Creating a jailbreak needs weeks and months of work, not to mention the vast experience and skills needed to pull of such a major task. One book can't accomplish that. So if you really want to become the next comex or pod2g: get off your backside, learn basics, read this book, read more materials, train your obtained skills and at the end of the road you might be able to develop your own exploits which will lead to a jailbreak.
2 人中、0人の方が、「このレビューが参考になった」と投票しています。
5つ星のうち 5.0 Fantastic guide to the security architecture of iOS 2013/2/1
投稿者 Kevin H - (Amazon.com)
形式: Kindle版 Amazonで購入
There isn't a lot of information on the web about iOS security. If you have any interest in that kind of thing at all, this is the book you need to read.
これらのレビューは参考になりましたか? ご意見はクチコミでお聞かせください。
click to open popover