EUR 7,68
Autre deviseQuantité disponible : 3 disponible(s)
Ajouter au panierEtat : Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc.
EUR 7,68
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc.
EUR 5,76
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
EUR 5,66
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : good. Signs of wear and consistent use.
EUR 9,21
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
EUR 6,58
Autre deviseQuantité disponible : 7 disponible(s)
Ajouter au panierpaperback. Etat : Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing and/or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
EUR 25,92
Autre deviseQuantité disponible : 5 disponible(s)
Ajouter au panierEtat : good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
EUR 24,74
Autre deviseQuantité disponible : 7 disponible(s)
Ajouter au panierPaperback. Etat : Good. 1st Edition. Ships in a BOX from Central Missouri! May not include working access code. Will not include dust jacket. Has used sticker(s) and some writing or highlighting. UPS shipping for most packages, (Priority Mail for AK/HI/APO/PO Boxes).
EUR 26,96
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Brand New! Not Overstocks or Low Quality Book Club Editions! Direct From the Publisher! We're not a giant, faceless warehouse organization! We're a small town bookstore that loves books and loves it's customers! Buy from Lakeside Books!
EUR 28,52
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 30,39
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
EUR 33,43
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 30,03
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Edité par John Wiley & Sons Inc, New York, 2012
ISBN 10 : 1118204123 ISBN 13 : 9781118204122
Langue: anglais
Vendeur : Grand Eagle Retail, Mason, OH, Etats-Unis
Edition originale
EUR 37,05
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it. Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks workExplores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacksAlso examines kernel debugging and exploitationCompanion website includes source code and tools to facilitate your efforts iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks. Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Vendeur : BargainBookStores, Grand Rapids, MI, Etats-Unis
EUR 44,28
Autre deviseQuantité disponible : 5 disponible(s)
Ajouter au panierPaperback or Softback. Etat : New. iOS Hacker's Handbook. Book.
EUR 39,35
Autre deviseQuantité disponible : 3 disponible(s)
Ajouter au panierEtat : New. pp. xx + 388 Illus.
EUR 30,94
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
EUR 44,78
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks.
EUR 31,55
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
EUR 34,01
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback / softback. Etat : New. New copy - Usually dispatched within 4 working days. 628.
EUR 36,03
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
EUR 49,43
Autre deviseQuantité disponible : 3 disponible(s)
Ajouter au panierEtat : New. pp. xx + 388.
EUR 36,39
Autre deviseQuantité disponible : 5 disponible(s)
Ajouter au panierEtat : good. May show signs of wear, highlighting, writing, and previous use. This item may be a former library book with typical markings. No guarantee on products that contain supplements Your satisfaction is 100% guaranteed. Twenty-five year bookseller with shipments to over fifty million happy customers.
Edité par John Wiley & Sons Inc, New York, 2012
ISBN 10 : 1118204123 ISBN 13 : 9781118204122
Langue: anglais
Vendeur : CitiRetail, Stevenage, Royaume-Uni
Edition originale
EUR 34,97
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it. Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks workExplores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacksAlso examines kernel debugging and exploitationCompanion website includes source code and tools to facilitate your efforts iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks. Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Edité par John Wiley & Sons Inc, New York, 2012
ISBN 10 : 1118204123 ISBN 13 : 9781118204122
Langue: anglais
Vendeur : AussieBookSeller, Truganina, VIC, Australie
Edition originale
EUR 60,61
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it. Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks workExplores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacksAlso examines kernel debugging and exploitationCompanion website includes source code and tools to facilitate your efforts iOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks. Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
EUR 44,91
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware - Discover all the security risks and exploits that can threaten iOS-based mobile devicesiOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it.\* Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work\* Explores iOS enterprise and encryption, code signing and memory protection, sandboxing, iPhone fuzzing, exploitation, ROP payloads, and baseband attacks\* Also examines kernel debugging and exploitation\* Companion website includes source code and tools to facilitate your effortsiOS Hacker's Handbook arms you with the tools needed to identify, understand, and foil iOS attacks.
Vendeur : THE SAINT BOOKSTORE, Southport, Royaume-Uni
EUR 43,27
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierPaperback / softback. Etat : New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 628.