eBooks-it.org Logo
eBooks-IT.org Inner Image

Hacking and Securing iOS Applications

Stealing Data, Hijacking Software, and How to Prevent It

Hacking and Securing iOS Applications Image

Book Details:

Publisher:O'Reilly Media
Series: OReilly , How To
Author:Jonathan A. Zdziarski
Edition:1
ISBN-10:1449318746
ISBN-13:9781449318741
Pages:358
Published:Jan 25 2012
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:10.23 MB

Book Description:

If you're an app developer with a solid foundation in Objective-C, this book is an absolute must chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Examine subtle vulnerabilities in real-world applications and avoid the same problems in your apps Learn how attackers infect apps with malware through code injection Discover how attackers defeat iOS keychain and data-protection encryption Use a debugger and custom code injection to manipulate the runtime Objective-C environment Prevent attackers from hijacking SSL sessions and stealing traffic Securely delete files and design your apps to prevent forensic data leakage Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

Download Link:

Related Books:

Beginning iOS Programming

Building and Deploying iOS Applications
Beginning iOS Programming Image
iOS 7 changed everything-get up to speed!iOS 7 is a major shift in the look and feel of apps-the first major sea change since the iPhone was first introduced. For apps to blend in with the new UI, each needs a complete redesign. Beginning iOS Programming: Building and Deploying iOS Applications starts at the beginning-including an introduction to Objective C-and gives you the skills you need to get your apps up and running. Author Nick Harris has extensive experience developing for iOS and provides a solid background for teaching the building blocks of app development.Learn Objective-C and how it differs from other programming languagesTurn your app idea into an actionable planBuild each feature with the help of standalone chaptersAssemble your proje...

Java EE 6 Cookbook

For Securing, Tuning and Extending Enterprise Applications
Java EE 6 Cookbook Image
Packed with comprehensive recipes to secure, tune, and extend your Java EE applications Overview Secure your Java applications using Java EE built-in features as well as the well-known Spring Security framework Utilize related recipes for testing various Java EE technologies including JPA, EJB, JSF, and Web services Explore various ways to extend a Java EE environment with the use of additional dynamic languages as well as frameworks A learn-by-example based approach that focuses on key concepts to provide the foundation to solve real world problems In Detail Java Platform, Enterprise Edition is a widely used platform for enterprise server programming in the Java programming language. This book covers exciting recipes on securing, tuning and extend...

Securing Ajax Applications

Ensuring the Safety of the Dynamic Web
Securing Ajax Applications Image
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the process from the start, you will learn how to build secure Ajax applications and discover how to respond quickly when attacks occur.Securing Ajax Applications succinctly explains that the same back-and-forth communications that make Ajax so responsive also gives invaders new opportunities to gather data, make creative new requests of your server, and interfere with the communications between you and your custome...



2007 - 2021 © eBooks-IT.org