menu
{ "item_title" : "Hacking and Securing IOS Applications", "item_author" : [" Jonathan Zdziarski "], "item_description" : "If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of.This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.Examine subtle vulnerabilities in real-world applications--and avoid the same problems in your appsLearn how attackers infect apps with malware through code injectionDiscover how attackers defeat iOS keychain and data-protection encryptionUse a debugger and custom code injection to manipulate the runtime Objective-C environmentPrevent attackers from hijacking SSL sessions and stealing trafficSecurely delete files and design your apps to prevent forensic data leakageAvoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/1/44/931/874/1449318746_b.jpg", "price_data" : { "retail_price" : "39.99", "online_price" : "39.99", "our_price" : "39.99", "club_price" : "39.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Hacking and Securing IOS Applications|Jonathan Zdziarski

Hacking and Securing IOS Applications : Stealing Data, Hijacking Software, and How to Prevent It

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

If you're an app developer with a solid foundation in Objective-C, this book is an absolute must--chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

  • Examine subtle vulnerabilities in real-world applications--and avoid the same problems in your apps
  • Learn how attackers infect apps with malware through code injection
  • Discover how attackers defeat iOS keychain and data-protection encryption
  • Use a debugger and custom code injection to manipulate the runtime Objective-C environment
  • Prevent attackers from hijacking SSL sessions and stealing traffic
  • Securely delete files and design your apps to prevent forensic data leakage
  • Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

This item is Non-Returnable

Details

  • ISBN-13: 9781449318741
  • ISBN-10: 1449318746
  • Publisher: O'Reilly Media
  • Publish Date: February 2012
  • Dimensions: 9.19 x 7 x 0.74 inches
  • Shipping Weight: 1.26 pounds
  • Page Count: 354

Related Categories

You May Also Like...

    1

BAM Customer Reviews