Search Books
R Graphics Cookbook: Practi… Learning Android: Develop M…

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

Author Jonathan Zdziarski
Publisher O'Reilly Media
Category Computers
📄 Viewing lite version Full site ›
🌎 Shop on Amazon — choose country
28.43 39.99 USD
🛒 Buy New on Amazon 🇺🇸 🏷 Buy Used — $18.78

✓ Usually ships in 24 hours

Share:
Book Details
ISBN / ASIN1449318746
ISBN-139781449318741
AvailabilityUsually ships in 24 hours
Sales Rank1,534,499
CategoryComputers
MarketplaceUnited States 🇺🇸

Description

If you re an app developer with a solid foundation in Objective-C, this book is an absolute must chances are very high that your company s iOS applications are vulnerable to attack. That s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren t aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

  • Examine subtle vulnerabilities in real-world applications and avoid the same problems in your apps
  • Learn how attackers infect apps with malware through code injection
  • Discover how attackers defeat iOS keychain and data-protection encryption
  • Use a debugger and custom code injection to manipulate the runtime Objective-C environment
  • Prevent attackers from hijacking SSL sessions and stealing traffic
  • Securely delete files and design your apps to prevent forensic data leakage
  • Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View
Computer Graphics
View