Hacking and Securing iOS Applications. Stealing Data, Hijacking Software, and How to Prevent It - Jonathan Zdziarski
- Dodał: administrator
- Data: 05:57 23-11-2018
- Kategoria: Informatyka i matematyka
If you...re an app developer with a solid foundation in Objective-C, this book is an absolute must-chances are very high that your company...s iOS applications are vulnerable to attack. That...s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren...t aware of.This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You...ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.Examine subtle vulnerabilities in real-world applications-and avoid the same problems in your appsLearn how attackers infect apps with malware through code injectionDiscover how attackers defeat iOS keychain and data-protection encryptionUse a debugger and custom code injection to manipulate the runtime Objective-C environmentPrevent attackers from hijacking SSL sessions and stealing trafficSecurely delete files and design your apps to prevent forensic data leakageAvoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace źródło opisu: Helion źródło okładki: Helion
| język | polski | ||
| data wydania | 17 stycznia 2012 | ||
| ISBN | 9781449325237 | ||
| kategoria | informatyka i matematyka |
Rejestracja jest za darmo i jest bardzo szybka! Kliknij tutaj aby założyć konto. Trwa to tylko 15 sekund!.
Podobne wpisy do Hacking and Securing iOS Applications. Stealing Data, Hijacking Software, and How to Prevent It - Jonathan Zdziarski
The Role of Innovations - Dymitrowski Adam
Powszechnie uważa się, że innowacje są niezbędne do skutecznej działalności przedsiębiorstw. Ze względu na dynamicznie postępujący proces globalizacji wydaje się, że związek między innowacjami i wynikami osiąganymi przez firmy powinien być badany w k...
Art of Atari - Tim Lapetino
ATARI is one of the most recognized names in the world. Since its formation in 1972, the company pioneered hundreds of iconic titles including Asteroids, Centipede and Missile Command. In addition to hundreds of games created for arcades, home video...
Monetizing Innovation: How Smart Companies Design the Product Around the Price - Georg Tacke, Madhavan Ramanujam
Surprising rules for successful monetization Innovation is the most important driver of growth. Today, more than ever, companies need to innovate to survive. But successful innovation—measured in dollars and cents—is a very hard target to hit. Compan...
The Intel Trinity. How Robert Noyce, Gordon Moore, and Andy Grove Built the World's Most Important Company - Michael S. Malone
Based on unprecedented access to the corporation’s archives, The Intel Trinity is the first full history of Intel Corporation—the essential company of the digital age— told through the lives of the three most important figures in the company’s histor...
In the Footsteps of the Band of Brothers: A Return to Easy Company's Battlefields with Sgt. Forrest Guth - Larry Alexander
słowa kluczowe II wojna światowa język polski ISBN 0451229916 kategoria historyczna data wydania 2010 (data przybliżona) liczba stron 336
Social Network Analysis for Startups. Finding connections on the social web - Tsvetovat Maksim, Kouznetsov Alexander
Does your startup rely on social network analysis? This concise guide provides a statistical framework to help you identify social processes hidden among the tons of data now available.Social network analysis (SNA) is a discipline that predates Faceb...