Commencez à lire Hacking and Securing iOS Applications sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
 
Agrandissez cette image
 

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It [Format Kindle]

Jonathan Zdziarski
5.0 étoiles sur 5  Voir tous les commentaires (2 commentaires client)

Prix conseillé : EUR 15,44 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 33,25
Prix Kindle : EUR 10,81 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 22,44 (67%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 10,81  
Broché EUR 32,94  
Broché --  

Descriptions du produit

Présentation de l'éditeur

If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

  • Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps
  • Learn how attackers infect apps with malware through code injection
  • Discover how attackers defeat iOS keychain and data-protection encryption
  • Use a debugger and custom code injection to manipulate the runtime Objective-C environment
  • Prevent attackers from hijacking SSL sessions and stealing traffic
  • Securely delete files and design your apps to prevent forensic data leakage
  • Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 2171 KB
  • Nombre de pages de l'édition imprimée : 358 pages
  • Utilisation simultanée de l'appareil : Illimité
  • Editeur : O'Reilly Media; Édition : 1 (17 janvier 2012)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B006ZN9ZP2
  • Synthèse vocale : Activée
  • X-Ray :
  • Moyenne des commentaires client : 5.0 étoiles sur 5  Voir tous les commentaires (2 commentaires client)
  • Classement des meilleures ventes d'Amazon: n°136.491 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne

4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoiles
0
5.0 étoiles sur 5
5.0 étoiles sur 5
Commentaires client les plus utiles
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Enlightening and inspiring 26 février 2012
Par mko
Format:Format Kindle
This book shows the other side of Apple's devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.

When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your 'precious'. He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.

Book is both rewarding and demanding at the same time. If you are an iOS newbie, you'd better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.

Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won't be able to follow all exercises.
Avez-vous trouvé ce commentaire utile ?
5.0 étoiles sur 5 A must read for iPhone developers 13 mars 2012
Format:Format Kindle
This book is a must read for anyone concerned about Mobile Application & Data security. The author uses very clean, well explained and concise samples to demonstrate the many possible attacks against an iPhone and its data. He then explain how to write code to make hacker's job much more complicated.
I read this like a novel. I couldn't drop it until the end.
This is the best technical book I read since many years !
Avez-vous trouvé ce commentaire utile ?
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.5 étoiles sur 5  10 commentaires
6 internautes sur 6 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Highly recommend this if you are a penetration tester or iOS developer 24 février 2012
Par Some Guy - Publié sur Amazon.com
Format:Broché|Achat vérifié
I work as a penetration tester, and have a background in development. I found this book to be *extremely* well written, full of useful tutorials on how to attack iOS, and even more importantly how to write your applications to be less susceptible to attack.

In addition, the author references many valuable tools that were new to me to use during your penetration tests that can uncover flaws and vulnerabilities (eg Cycript) in applications.

The author was formerly (and maybe still is) a member of one of the original iPhone jail-breaking groups, and his expertise shows. I've already recommended this book to 3 co-workers, and if you develop iOS apps you *need* to read this book to understand how attackers think and how they will attempt to break your application.

And, of course, if you are involved in performing iOS application security reviews or penetration tests, this is an EXCELLENT book that will walk you through how to perform seemingly complex attacks against applications. Great book!
3 internautes sur 3 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 An absolute MUST READ for anyone working with iOS security -- developers and infosec alike 21 septembre 2012
Par Kenneth R. Van Wyk - Publié sur Amazon.com
Format:Broché|Achat vérifié
Highly useful reading for everyone working with iOS security, either in IT Security or app development. It provides hugely insightful and deep descriptions of how iOS encryption works (among many other things). Every iOS app developer should read and understand these things in detail. And the balance of technical information and labs that the reader can work through (including downloadable source code examples) makes this a practical book for many people. If you work in iOS security at any level, there is no excuse for not reading this book.
2 internautes sur 2 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Not just for iOS Developers 15 juin 2012
Par D. A. Smith - Publié sur Amazon.com
Format:Broché
In addition to the enormous value that this book has for anyone who is developing or testing applications for iOS, I believe that it has great value for others who need to have a good understanding of the risks that any iOS user is subject to.

With the growth of Bring Your Own Device (BYOD) in environments where data security is critical (business, healthcare, government, etc.) security and privacy officers, not to mention attorneys, need to cut through the hype about iPhone and iPad security and make truly qualified decisions. This volume will be very valuable regardless of their experience with Objective-C or Xcode.

It is very important that we develop a sophisticated skepticism regarding security certifications that don't test implementation, or closed-source system software that provides services like encryption with a "trust us, we know what we're doing" attitude. This volume is an eye-opener for anyone thinking about putting important information on an iOS device.
3 internautes sur 4 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Enlightening and inspiring 26 février 2012
Par mko - Publié sur Amazon.com
Format:Format Kindle
This book shows the other side of Apple's devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.

When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your "precious". He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.

Book is both rewarding and demanding at the same time. If you are an iOS newbie, you'd better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.

Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won't be able to follow all exercises.
2 internautes sur 3 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 Solid resource, very dated 14 août 2013
Par Amazon Customer - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
I found this book a thorough and solid resource, however quite dated. A book like this, needs to be updated or have updates online for drawing from. The mobile space (including iOS) moves way too fast for such a out of date resource. The work, though is very thorough and informative.
Ces commentaires ont-ils été utiles ?   Dites-le-nous
Rechercher des commentaires
Rechercher uniquement parmi les commentaires portant sur ce produit

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique