Hacking and Securing iOS Applications
Stealing Data, Hijacking Software, and How to Prevent It
Book Details:
Pages: | 358 |
Published: | Jan 25 2012 |
Posted: | Nov 19 2014 |
Language: | English |
Book format: | PDF |
Book size: | 10.23 MB |
Book Description:
If you're an app developer with a solid foundation in Objective-C, this book is an absolute must chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Examine subtle vulnerabilities in real-world applications and avoid the same problems in your apps Learn how attackers infect apps with malware through code injection Discover how attackers defeat iOS keychain and data-protection encryption Use a debugger and custom code injection to manipulate the runtime Objective-C environment Prevent attackers from hijacking SSL sessions and stealing traffic Securely delete files and design your apps to prevent forensic data leakage Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace
Building and Deploying iOS Applications
iOS 7 changed everything-get up to speed!iOS 7 is a major shift in the look and feel of apps-the first major sea change since the iPhone was first introduced. For apps to blend in with the new UI, each needs a complete redesign. Beginning iOS Programming: Building and Deploying iOS Applications starts at the beginning-including an introduction to Objective C-and gives you the skills you need to get your apps up and running. Author Nick Harris has extensive experience developing for iOS and provides a solid background for teaching the building blocks of app development.Learn Objective-C and how it differs from other programming languagesTurn your app idea into an actionable planBuild each feature with the help of standalone chaptersAssemble your proje...
For Securing, Tuning and Extending Enterprise Applications
Packed with comprehensive recipes to secure, tune, and extend your Java EE applications Overview Secure your Java applications using Java EE built-in features as well as the well-known Spring Security framework Utilize related recipes for testing various Java EE technologies including JPA, EJB, JSF, and Web services Explore various ways to extend a Java EE environment with the use of additional dynamic languages as well as frameworks A learn-by-example based approach that focuses on key concepts to provide the foundation to solve real world problems In Detail Java Platform, Enterprise Edition is a widely used platform for enterprise server programming in the Java programming language. This book covers exciting recipes on securing, tuning and extend...
Ensuring the Safety of the Dynamic Web
Ajax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the process from the start, you will learn how to build secure Ajax applications and discover how to respond quickly when attacks occur.Securing Ajax Applications succinctly explains that the same back-and-forth communications that make Ajax so responsive also gives invaders new opportunities to gather data, make creative new requests of your server, and interfere with the communications between you and your custome...
2007 - 2021 © eBooks-IT.org