This title will be released on .
This eBook is no longer available for sale.
This eBook is not available in your country.
About the eBook
If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.
This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.
- Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps
- Learn how attackers infect apps with malware through code injection
- Discover how attackers defeat iOS keychain and data-protection encryption
- Use a debugger and custom code injection to manipulate the runtime Objective-C environment
- Prevent attackers from hijacking SSL sessions and stealing traffic
- Securely delete files and design your apps to prevent forensic data leakage
- Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace
Show more
Show more
-
Publisher:
-
Published: ; Copyright:
- ISBN:
- Edition:
- Title:
-
Series:
- Author:
-
Imprint:
-
Language:
- Number of Pages:
[disclaimer]
Page count shown is an approximation provided by the publisher. The actual page count will vary based on various factors such your device's screen size and font-size.
Download file formats
This ebook is available in file types:
This ebook is available in:
After you've bought this ebook, you can choose to download either the PDF version or the ePub, or both.
DRM Free
The publisher has supplied this book in DRM Free form with digital watermarking.
Required software
You can read this eBook on any device that supports DRM-free EPUB or DRM-free PDF format.
Digital Rights Management (DRM)
The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.
Required software
To read this ebook on a mobile device (phone or tablet) you'll need to install one of these free apps:
To download and read this eBook on a PC or Mac:
- Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)
Limits on printing and copying
The publisher has set limits on how much of this ebook you may print or copy. See details.
-
{{ format_drm_information.format_name }} unrestricted
{{ format_drm_information.format_name }} {{format_drm_information.page_percent}}% pages every day{{format_drm_information.interval}} days
{{ format_drm_information.format_name }} off
Read Aloud
-
{{ read_aloud_information.format_name }} on
{{ read_aloud_information.format_name }} off