Enjoy fast, FREE delivery, exclusive deals and award-winning movies & TV shows with Prime
Try Prime
and start saving today with Fast, FREE Delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Instant streaming of thousands of movies and TV episodes with Prime Video
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Try Kindle Edition $0.00
Try Kindle Edition $0.00
- Highlight, take notes, and search in the book
- In this edition, page numbers are just like the physical edition
Buy new:
$8.74$8.74
FREE delivery: Friday, Sep 8 on orders over $25.00 shipped by Amazon.
Payment
Secure transaction
Ships from
Amazon.com
Sold by
Amazon.com
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Buy used: $1.39
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required. Learn more
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It 1st Edition
If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must―chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.
This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.
- Examine subtle vulnerabilities in real-world applications―and avoid the same problems in your apps
- Learn how attackers infect apps with malware through code injection
- Discover how attackers defeat iOS keychain and data-protection encryption
- Use a debugger and custom code injection to manipulate the runtime Objective-C environment
- Prevent attackers from hijacking SSL sessions and stealing traffic
- Securely delete files and design your apps to prevent forensic data leakage
- Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace
- ISBN-101449318746
- ISBN-13978-1449318741
- Edition1st
- PublisherO'Reilly Media
- Publication dateFebruary 21, 2012
- LanguageEnglish
- Dimensions7 x 0.74 x 9.19 inches
- Print length354 pages
Customers who bought this item also bought
Editorial Reviews
About the Author
Jonathan is also a full-time Sr. Forensic Scientist, where, among other things, he performs penetration testing of iOS applications for corporate clients.
Product details
- Publisher : O'Reilly Media; 1st edition (February 21, 2012)
- Language : English
- Paperback : 354 pages
- ISBN-10 : 1449318746
- ISBN-13 : 978-1449318741
- Item Weight : 1.26 pounds
- Dimensions : 7 x 0.74 x 9.19 inches
- Best Sellers Rank: #3,633,788 in Books (See Top 100 in Books)
- #1,121 in Computer Operating Systems (Books)
- #1,503 in Mobile App Development & Programming
- #1,622 in Computer Networking (Books)
- Customer Reviews:
Important information
To report an issue with this product, click here.
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonRead reviews that mention
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
In addition, the author references many valuable tools that were new to me to use during your penetration tests that can uncover flaws and vulnerabilities (eg Cycript) in applications.
The author was formerly (and maybe still is) a member of one of the original iPhone jail-breaking groups, and his expertise shows. I've already recommended this book to 3 co-workers, and if you develop iOS apps you *need* to read this book to understand how attackers think and how they will attempt to break your application.
And, of course, if you are involved in performing iOS application security reviews or penetration tests, this is an EXCELLENT book that will walk you through how to perform seemingly complex attacks against applications. Great book!
Top reviews from other countries
If you work in enterprise and need to know the weaknesses of iOS it is well worth reading.
If your a beginner don't expect an easy ride.You can't just flick through the pages compile the examples and expect them to work. You will need to give them a go and play around until you can get them working.
I would have given the book 5* if the examples were without errors, a little bit poor on O'reillys part for not proof reading them / testing.
Never the less, I found this a really good read, opened my eyes to different exploits that exist in iOS and how to get them onto devices. Very well thought out and structured, particularly liked the Attacking & Defending sides of the book.
Buy it!



