Please note: In order to keep Hive up to date and provide users with the best features, we are no longer able to fully support Internet Explorer. The site is still available to you, however some sections of the site may appear broken. We would encourage you to move to a more modern browser like Firefox, Edge or Chrome in order to experience the site fully.

Hacking and Securing iOS Applications : Stealing Data, Hijacking Software, and How to Prevent It, PDF eBook

Hacking and Securing iOS Applications : Stealing Data, Hijacking Software, and How to Prevent It PDF

PDF

Please note: eBooks can only be purchased with a UK issued credit card and all our eBooks (ePub and PDF) are DRM protected.

Description

If youre an app developer with a solid foundation in Objective-C, this book is an absolute mustchances are very high that your companys iOS applications are vulnerable to attack. Thats because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers arent aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. Youll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

  • Examine subtle vulnerabilities in real-world applicationsand avoid the same problems in your apps
  • Learn how attackers infect apps with malware through code injection
  • Discover how attackers defeat iOS keychain and data-protection encryption
  • Use a debugger and custom code injection to manipulate the runtime Objective-C environment
  • Prevent attackers from hijacking SSL sessions and stealing traffic
  • Securely delete files and design your apps to prevent forensic data leakage
  • Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

Information

Other Formats

Information