Hacking and Securing iOS Applications und über 1,5 Millionen weitere Bücher verfügbar für Amazon Kindle. Erfahren Sie mehr


oder
Loggen Sie sich ein, um 1-Click® einzuschalten.
Jetzt eintauschen
und EUR 7,67 Gutschein erhalten
Eintausch
Alle Angebote
Möchten Sie verkaufen? Hier verkaufen
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 
Beginnen Sie mit dem Lesen von Hacking and Securing iOS Applications auf Ihrem Kindle in weniger als einer Minute.

Sie haben keinen Kindle? Hier kaufen oder eine gratis Kindle Lese-App herunterladen.

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It [Englisch] [Taschenbuch]

Jonathan Zdziarski
5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
Preis: EUR 24,95 kostenlose Lieferung. Siehe Details.
  Alle Preisangaben inkl. MwSt.
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Nur noch 1 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 10,81  
Taschenbuch EUR 24,95  

Kurzbeschreibung

21. Februar 2012
If you're an app developer with a solid foundation in Objective-C, this book is an absolute must-chances are very high that your company's iOS applications are vulnerable to attack. That's because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren't aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You'll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.* Examine subtle vulnerabilities in real-world applications-and avoid the same problems in your apps* Learn how attackers infect apps with malware through code injection* Discover how attackers defeat iOS keychain and data-protection encryption* Use a debugger and custom code injection to manipulate the runtime Objective-C environment* Prevent attackers from hijacking SSL sessions and stealing traffic* Securely delete files and design your apps to prevent forensic data leakage* Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

Hinweise und Aktionen

  • Amazon Trade-In: Tauschen Sie Ihre gebrauchten Bücher gegen einen Amazon.de Gutschein ein - wir übernehmen die Versandkosten. Mehr erfahren


Wird oft zusammen gekauft

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It + iOS Hacker's Handbook + iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
Preis für alle drei: EUR 112,40

Die ausgewählten Artikel zusammen kaufen


Produktinformation

  • Taschenbuch: 354 Seiten
  • Verlag: O'Reilly & Associates; Auflage: 1 (21. Februar 2012)
  • Sprache: Englisch
  • ISBN-10: 1449318746
  • ISBN-13: 978-1449318741
  • Größe und/oder Gewicht: 1,9 x 17,8 x 23,5 cm
  • Durchschnittliche Kundenbewertung: 5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)
  • Amazon Bestseller-Rang: Nr. 86.412 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)

Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Produktbeschreibungen

Über den Autor und weitere Mitwirkende

Jonathan Zdziarski is better known as the hacker "NerveGas" in the iOS development community. His work in cracking the iPhone helped lead the effort to port the first open source applications to it, and his book iPhone Open Application Development taught developers how to write applications for the popular device long before Apple introduced its own SDK. Jonathan is also the author of many other books, including iPhone SDK Application Development and iPhone Forensics. Jonathan presently supports over 2,000 law enforcement agencies worldwide and distributes a suite of iOS forensic imaging tools to obtain evidence from iOS devices for criminal cases. He frequently consults and trains law enforcement agencies and assists forensic examiners in their investigations. Jonathan is also a full-time Sr. Forensic Scientist, where, among other things, he performs penetration testing of iOS applications for corporate clients.

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


Kundenrezensionen

4 Sterne
0
3 Sterne
0
2 Sterne
0
1 Sterne
0
5.0 von 5 Sternen
5.0 von 5 Sternen
Die hilfreichsten Kundenrezensionen
5.0 von 5 Sternen Enlightening and inspiring 26. Februar 2012
Von mko
Format:Kindle Edition
This book shows the other side of Apple's devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.

When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your 'precious'. He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.

Book is both rewarding and demanding at the same time. If you are an iOS newbie, you'd better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.

Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won't be able to follow all exercises.
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.5 von 5 Sternen  10 Rezensionen
6 von 6 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Highly recommend this if you are a penetration tester or iOS developer 24. Februar 2012
Von Some Guy - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
I work as a penetration tester, and have a background in development. I found this book to be *extremely* well written, full of useful tutorials on how to attack iOS, and even more importantly how to write your applications to be less susceptible to attack.

In addition, the author references many valuable tools that were new to me to use during your penetration tests that can uncover flaws and vulnerabilities (eg Cycript) in applications.

The author was formerly (and maybe still is) a member of one of the original iPhone jail-breaking groups, and his expertise shows. I've already recommended this book to 3 co-workers, and if you develop iOS apps you *need* to read this book to understand how attackers think and how they will attempt to break your application.

And, of course, if you are involved in performing iOS application security reviews or penetration tests, this is an EXCELLENT book that will walk you through how to perform seemingly complex attacks against applications. Great book!
3 von 3 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen An absolute MUST READ for anyone working with iOS security -- developers and infosec alike 21. September 2012
Von Kenneth R. Van Wyk - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
Highly useful reading for everyone working with iOS security, either in IT Security or app development. It provides hugely insightful and deep descriptions of how iOS encryption works (among many other things). Every iOS app developer should read and understand these things in detail. And the balance of technical information and labs that the reader can work through (including downloadable source code examples) makes this a practical book for many people. If you work in iOS security at any level, there is no excuse for not reading this book.
2 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Not just for iOS Developers 15. Juni 2012
Von D. A. Smith - Veröffentlicht auf Amazon.com
Format:Taschenbuch
In addition to the enormous value that this book has for anyone who is developing or testing applications for iOS, I believe that it has great value for others who need to have a good understanding of the risks that any iOS user is subject to.

With the growth of Bring Your Own Device (BYOD) in environments where data security is critical (business, healthcare, government, etc.) security and privacy officers, not to mention attorneys, need to cut through the hype about iPhone and iPad security and make truly qualified decisions. This volume will be very valuable regardless of their experience with Objective-C or Xcode.

It is very important that we develop a sophisticated skepticism regarding security certifications that don't test implementation, or closed-source system software that provides services like encryption with a "trust us, we know what we're doing" attitude. This volume is an eye-opener for anyone thinking about putting important information on an iOS device.
3 von 4 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Enlightening and inspiring 26. Februar 2012
Von mko - Veröffentlicht auf Amazon.com
Format:Kindle Edition
This book shows the other side of Apple's devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.

When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your "precious". He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.

Book is both rewarding and demanding at the same time. If you are an iOS newbie, you'd better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.

Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won't be able to follow all exercises.
2 von 3 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Solid resource, very dated 14. August 2013
Von Amazon Customer - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Verifizierter Kauf
I found this book a thorough and solid resource, however quite dated. A book like this, needs to be updated or have updates online for drawing from. The mobile space (including iOS) moves way too fast for such a out of date resource. The work, though is very thorough and informative.
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden


Ihr Kommentar