Facebook Twitter Pinterest <Einbetten>
  • Alle Preisangaben inkl. MwSt.
Nur noch 3 auf Lager (mehr ist unterwegs).
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
Hacking and Securing iOS ... ist in Ihrem Einkaufwagen hinzugefügt worden
+ EUR 3,00 Versandkosten
Gebraucht: Sehr gut | Details
Verkauft von worldofbooksde
Zustand: Gebraucht: Sehr gut
Kommentar: The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 2 Bilder anzeigen

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It (Englisch) Taschenbuch – 21. Februar 2012

5.0 von 5 Sternen 2 Kundenrezensionen

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Preis
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
Taschenbuch
"Bitte wiederholen"
EUR 24,95
EUR 20,84 EUR 14,99
53 neu ab EUR 20,84 8 gebraucht ab EUR 14,99
click to open popover

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.


Produktinformation

Produktbeschreibungen

Über den Autor und weitere Mitwirkende

Jonathan Zdziarski is better known as the hacker "NerveGas" in the iOS development community. His work in cracking the iPhone helped lead the effort to port the first open source applications to it, and his book iPhone Open Application Development taught developers how to write applications for the popular device long before Apple introduced its own SDK. Jonathan is also the author of many other books, including iPhone SDK Application Development and iPhone Forensics. Jonathan presently supports over 2,000 law enforcement agencies worldwide and distributes a suite of iOS forensic imaging tools to obtain evidence from iOS devices for criminal cases. He frequently consults and trains law enforcement agencies and assists forensic examiners in their investigations. Jonathan is also a full-time Sr. Forensic Scientist, where, among other things, he performs penetration testing of iOS applications for corporate clients.


Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?

Kundenrezensionen

5.0 von 5 Sternen
5 Sterne
2
4 Sterne
0
3 Sterne
0
2 Sterne
0
1 Stern
0
Beide Kundenrezensionen anzeigen
Sagen Sie Ihre Meinung zu diesem Artikel

Top-Kundenrezensionen

Format: Kindle Edition
This book shows the other side of Apple's devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.

When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your 'precious'. He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.

Book is both rewarding and demanding at the same time. If you are an iOS newbie, you'd better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.

Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won't be able to follow all exercises.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden
Format: Taschenbuch Verifizierter Kauf
Explain things in a very detail way! I like it very much! Would like to know more books from him.
Kommentar War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 4.5 von 5 Sternen 14 Rezensionen
6 von 6 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Highly recommend this if you are a penetration tester or iOS developer 24. Februar 2012
Von Some Guy - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I work as a penetration tester, and have a background in development. I found this book to be *extremely* well written, full of useful tutorials on how to attack iOS, and even more importantly how to write your applications to be less susceptible to attack.

In addition, the author references many valuable tools that were new to me to use during your penetration tests that can uncover flaws and vulnerabilities (eg Cycript) in applications.

The author was formerly (and maybe still is) a member of one of the original iPhone jail-breaking groups, and his expertise shows. I've already recommended this book to 3 co-workers, and if you develop iOS apps you *need* to read this book to understand how attackers think and how they will attempt to break your application.

And, of course, if you are involved in performing iOS application security reviews or penetration tests, this is an EXCELLENT book that will walk you through how to perform seemingly complex attacks against applications. Great book!
2 von 2 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Not just for iOS Developers 15. Juni 2012
Von D. A. Smith - Veröffentlicht auf Amazon.com
Format: Taschenbuch
In addition to the enormous value that this book has for anyone who is developing or testing applications for iOS, I believe that it has great value for others who need to have a good understanding of the risks that any iOS user is subject to.

With the growth of Bring Your Own Device (BYOD) in environments where data security is critical (business, healthcare, government, etc.) security and privacy officers, not to mention attorneys, need to cut through the hype about iPhone and iPad security and make truly qualified decisions. This volume will be very valuable regardless of their experience with Objective-C or Xcode.

It is very important that we develop a sophisticated skepticism regarding security certifications that don't test implementation, or closed-source system software that provides services like encryption with a "trust us, we know what we're doing" attitude. This volume is an eye-opener for anyone thinking about putting important information on an iOS device.
3 von 4 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Enlightening and inspiring 26. Februar 2012
Von mko - Veröffentlicht auf Amazon.com
Format: Kindle Edition
This book shows the other side of Apple's devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.

When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your "precious". He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.

Book is both rewarding and demanding at the same time. If you are an iOS newbie, you'd better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.

Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won't be able to follow all exercises.
3 von 4 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen An absolute MUST READ for anyone working with iOS security -- developers and infosec alike 21. September 2012
Von Kenneth R. Van Wyk - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
Highly useful reading for everyone working with iOS security, either in IT Security or app development. It provides hugely insightful and deep descriptions of how iOS encryption works (among many other things). Every iOS app developer should read and understand these things in detail. And the balance of technical information and labs that the reader can work through (including downloadable source code examples) makes this a practical book for many people. If you work in iOS security at any level, there is no excuse for not reading this book.
3 von 4 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Solid resource, very dated 14. August 2013
Von Amazon Customer - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
I found this book a thorough and solid resource, however quite dated. A book like this, needs to be updated or have updates online for drawing from. The mobile space (including iOS) moves way too fast for such a out of date resource. The work, though is very thorough and informative.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.