下载  >  移动开发  >  iOS  > Hacking and Securing Ios Applications

Hacking and Securing Ios Applications 评分

Jonathan Zdziarski作品 Hacking and Securing Ios Applications电子书

...展开详情
所需积分/C币:9 上传时间:2012-05-30 资源大小:9.95MB
举报 举报 收藏 收藏 (1)
分享 分享

评论 下载该资源后可以进行评论 22

shuwangyong 这本书还不错,就是全英文的看起来比较慢
2016-06-06
回复
hawk1987 英文原版,还没读完,对于学习和理解iOS的应用非常全面和丰富。需要有一定基础,有一部破解过的iOS手机
2015-08-19
回复
liuxg1582 真的很好。不过我不会英语,一个字一个字翻译吧,铁杵磨成针!
2015-05-05
回复
airtayork 可以看看,这方面的书不是很多。
2015-01-16
回复
bjwangwh 非常不错,安全就是好
2015-01-08
回复
Hacking and Securing iOS Applications.pdf

高清文字版,带目录 完整版; ios开发者必看书籍,国外经典书籍

立即下载
Hacking and Securing iOS Application

Based on unique and previously undocumented research, this book by noted iOS expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the exploitable flaws lie in their code, and in this

立即下载
Hacking and Securing Ios Applications

Jonathan Zdziarski作品 Hacking and Securing Ios Applications电子书

立即下载
Hacking and Securing iOS Applications 无水印pdf

Hacking and Securing iOS Applications 英文无水印pdf pdf所有页面使用FoxitReader和PDF-XChangeViewer测试都可以打开 本资源转载自网络,如有侵权,请联系上传者或csdn删除 本资源转载自网络,如有侵权,请联系上传者或csdn删除

立即下载
iOS逆向系列:Hacking and Securing iOS Applications

iOS逆向系列:Hacking and Securing iOS Applications

立即下载
Hacking.and.Securing.iOS.Applications

Hacking.and.Securing.iOS.Applications

立即下载
【Hacking.and.Securing.iOS.Applications】[PDF+源代码] [iPhone/iPad/iOS]

【Hacking.and.Securing.iOS.Applications】[PDF+源代码] [iPhone/iPad/iOS]

立即下载
Securing-Optimizing-Linux-The-Hacking-Solution-v3.0.pdf

This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux

立即下载
Securing Your Business with Cisco ASA and PIX Firewalls

<br>The easy-to-use guide for learning how to secure networks with the world-class PIX Firewall Ideal for network administrators with little or no firewall experience Easily explains how to implement a security system in small and medium businesses or at home using graphical PIX Device Manager (PDM

立即下载
Hacking Windows® XP

E文版 Part I: Customizing Your System . . . . . . . . . . . . . . . . . . . . . . . 1 Chapter 1: Customizing the Look of the Startup . . . . . . . . . . . . . . . . . . . . . . . 3 Chapter 2: Customizing User Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . 39 Chapter 3: Hacking the Des

立即下载
How to Cheat at Securing a Wireless Network

Product Description Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless

立即下载
Python Penetration Testing Essentials, 2nd Edition

Title: Python Penetration Testing Essentials, 2nd Edition Author: Mohit Length: 230 pages Edition: 2nd Revised edition Language: English Publisher: Packt Publishing Publication Date: 2018-05-30 ISBN-10: 1789138965 ISBN-13: 9781789138962 This book gives you the skills you need to use Python for pene

立即下载
Hands-On Penetration Testing on Windows - 2018 pdf 5分

Hands-On Penetration Testing on Windows pdf 页数:454 来源: https://itbooks.ctfile.com/fs/18113597-302639985 Master the art of identifying vulnerabilities within the Windows OS and develop the desired solutions for it using Kali Linux. Book Description Windows has always been the go-to platform for u

立即下载
Basic Security Testing with Kali Linux (2014)

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker wou

立即下载
Basic.Security.Testing.with.Kali.Linux.2.153050656

Basic Security Testing with Kali Linux 2 Kali Linux 2 (2016) is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use, so they can find security issues before the bad guys do. In Basic Security Testing with Kali Linux 2, you will learn basic

立即下载
黑客2016年手冊

Distros The distro is the core of Linux, so make sure you get the right one. Did we say the distro was the core? Forget that: software is what you need. Dive into the world of hacking with this in-depth manual that covers the big topics, from the Linux kernel and wider open-source OS to hacking serv

立即下载
counter hack reloaded

Why This Book? If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle. —Sun Tzu, Art of Wa

立即下载