Hacking and Securing iOS Applications Hacking and Securing iOS Applications

Hacking and Securing iOS Applications

Stealing Data, Hijacking Software, and How to Prevent It

    • 5.0 • 3 Ratings
    • $19.99
    • $19.99

Publisher Description

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.
Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your appsLearn how attackers infect apps with malware through code injectionDiscover how attackers defeat iOS keychain and data-protection encryptionUse a debugger and custom code injection to manipulate the runtime Objective-C environmentPrevent attackers from hijacking SSL sessions and stealing trafficSecurely delete files and design your apps to prevent forensic data leakageAvoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

GENRE
Computers & Internet
RELEASED
2012
January 17
LANGUAGE
EN
English
LENGTH
358
Pages
PUBLISHER
O'Reilly Media
SELLER
O Reilly Media, Inc.
SIZE
5.3
MB
Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition Gray Hat Hacking The Ethical Hacker's Handbook, Fourth Edition
2015
The Art of Mac Malware, Volume 1 The Art of Mac Malware, Volume 1
2022
Hacking Exposed 7 Hacking Exposed 7
2012
Attacking Network Protocols Attacking Network Protocols
2017
The Mac Hacker's Handbook The Mac Hacker's Handbook
2011
Art of Software Security Assessment, The Art of Software Security Assessment, The
2006
iPhone Forensics iPhone Forensics
2008
Łamanie i zabezpieczanie aplikacji w systemie iOS Łamanie i zabezpieczanie aplikacji w systemie iOS
2012
iPhone Open Application Development iPhone Open Application Development
2008