Hacking and Securing iOS Applications

Stealing Data, Hijacking Software, and How to Prevent It

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Hacking and Securing iOS Applications by Jonathan Zdziarski, O'Reilly Media
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Jonathan Zdziarski ISBN: 9781449325237
Publisher: O'Reilly Media Publication: January 17, 2012
Imprint: O'Reilly Media Language: English
Author: Jonathan Zdziarski
ISBN: 9781449325237
Publisher: O'Reilly Media
Publication: January 17, 2012
Imprint: O'Reilly Media
Language: English

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

  • Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps
  • Learn how attackers infect apps with malware through code injection
  • Discover how attackers defeat iOS keychain and data-protection encryption
  • Use a debugger and custom code injection to manipulate the runtime Objective-C environment
  • Prevent attackers from hijacking SSL sessions and stealing traffic
  • Securely delete files and design your apps to prevent forensic data leakage
  • Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

More books from O'Reilly Media

Cover of the book Learning Flex 4 by Jonathan Zdziarski
Cover of the book Microsoft Project 2010: The Missing Manual by Jonathan Zdziarski
Cover of the book Building Isomorphic JavaScript Apps by Jonathan Zdziarski
Cover of the book Head First Kotlin by Jonathan Zdziarski
Cover of the book Essential iOS Build and Release by Jonathan Zdziarski
Cover of the book Java 8 Lambdas by Jonathan Zdziarski
Cover of the book ZooKeeper by Jonathan Zdziarski
Cover of the book Building Applications on Mesos by Jonathan Zdziarski
Cover of the book Social Media Marketing und Recht, 2. Auflage by Jonathan Zdziarski
Cover of the book Just Spring Data Access by Jonathan Zdziarski
Cover of the book Saving Money and Time with Virtual Server by Jonathan Zdziarski
Cover of the book Juniper MX Series by Jonathan Zdziarski
Cover of the book Excel 2003 for Starters: The Missing Manual by Jonathan Zdziarski
Cover of the book Skype Hacks by Jonathan Zdziarski
Cover of the book Das Buch zu iTunes & iCloud by Jonathan Zdziarski
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy