Please Sign Up to Request This Product
Hacking and Securing iOS Applications
Stealing Data, Hijacking Software, and How to Prevent It
Average Blogger Rating:
You need to be an approved blogger to request a product. Please sign up to request access or login to your account.
If you've already signed up and you haven't heard from us yet please email bloggers\@oreilly.com and we will check on your request.
Based on unique and previously undocumented research, this book by noted forensic expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps. Zdziarski shows finance companies, large institutions and others where the exploitable flaws lie in their code, and in this book he will show you as well, in a clear, direct, and immediately applicable style.
On Feb 26 Nick Charlton wrote: Review: Hacking and Securing iOS Applications by Jonathan Zdziarski
I started this just after the Path fiasco. It seemed timely to brush up on my security knowledge, especially for iOS intricacies, recommended practices and understanding obvious flaws. At the same time, O’Reilly had published “Hacking and Securing iOS Applications” by Jonathan Zdziarski, so I got a copy. This book provides exactly what I wanted; it’s a great next-step if you’ve been developing for iOS or the Mac for a while. Fortunately it assumes that, which allows the book to quickly jump into examples and solutions. Full Review >
On Feb 26 Michal Konrad Owsiak wrote: Enlightening and inspiring
This book shows the other side of Apple’s devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin.
When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your “precious”. He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic.
Book is both rewarding and demanding at the same time. If you are an iOS newbie, you’d better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one.
Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won’t be able to follow all exercises. Full Review >
Receive free ebooks and videos in exchange for your reviews.
Learn more >