Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It [Paperback]If you’re an app developer with a solid foundation in Objective-C, this book is an absolute must—chances are very high that your company’s iOS applications are vulnerable to attack. That’s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren’t aware of.

This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You’ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary.

  • Examine subtle vulnerabilities in real-world applications—and avoid the same problems in your apps
  • Learn how attackers infect apps with malware through code injection
  • Discover how attackers defeat iOS keychain and data-protection encryption
  • Use a debugger and custom code injection to manipulate the runtime Objective-C environment
  • Prevent attackers from hijacking SSL sessions and stealing traffic
  • Securely delete files and design your apps to prevent forensic data leakage
  • Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace

Price:

Click here to buy from Amazon

Corporate Cyberwar

Corporate CyberwarCorporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Price: $20.00

Click here to buy from Amazon

 Related articles