undrgrnd Cliquez ici KDPContest nav-sa-clothing-shoes nav-sa-clothing-shoes Cloud Drive Photos cliquez_ici nav_WSHT16 Cliquez ici Acheter Fire Cliquez ici cliquez_ici Jeux Vidéo soldes montres soldes bijoux

Commentaires client

5,0 sur 5 étoiles
2
5,0 sur 5 étoiles
5 étoiles
2
4 étoiles
0
3 étoiles
0
2 étoiles
0
1 étoile
0

Votre évaluation :(Effacer)Evaluez cet article
Partagez votre opinion avec les autres clients

Un problème s'est produit lors du filtrage des commentaires. Veuillez réessayer ultérieurement.

le 26 février 2012
This book shows the other side of Apple's devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.

When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your 'precious'. He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.

Book is both rewarding and demanding at the same time. If you are an iOS newbie, you'd better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.

Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won't be able to follow all exercises.
0Commentaire| Une personne a trouvé cela utile. Ce commentaire vous a-t-il été utile ?OuiNonSignaler un abus
le 13 mars 2012
This book is a must read for anyone concerned about Mobile Application & Data security. The author uses very clean, well explained and concise samples to demonstrate the many possible attacks against an iPhone and its data. He then explain how to write code to make hacker's job much more complicated.
I read this like a novel. I couldn't drop it until the end.
This is the best technical book I read since many years !
0Commentaire|Ce commentaire vous a-t-il été utile ?OuiNonSignaler un abus

Liens Sponsorisés

  (De quoi s'agit-il?)