ShopSpell

iOS Application Security The Definitive Guide for Hackers and Developers [Paperback]

$31.99     $49.95    36% Off      (Free Shipping)
15 available
  • Category: Books (Computers)
  • Author:  Thiel, David
  • Author:  Thiel, David
  • ISBN-10:  159327601X
  • ISBN-10:  159327601X
  • ISBN-13:  9781593276010
  • ISBN-13:  9781593276010
  • Publisher:  No Starch Press
  • Publisher:  No Starch Press
  • Pages:  296
  • Pages:  296
  • Binding:  Paperback
  • Binding:  Paperback
  • Pub Date:  01-Jul-2016
  • Pub Date:  01-Jul-2016
  • SKU:  159327601X-11-SPLV
  • SKU:  159327601X-11-SPLV
  • Item ID: 100650847
  • List Price: $49.95
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Jan 17 to Jan 19
  • Notes: Brand New Book. Order Now.
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. IniOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course on iOS application structure and Objective-C design patterns, you’ll move on to spotting bad code and plugging the holes. You’ll learn about:
–The iOS security model and the limits of its built-in protections
–The myriad ways sensitive data can leak into places it shouldn’t, such as through the pasteboard
–How to implement encryption with the Keychain, the Data Protection API, and CommonCrypto
–Legacy flaws from C that still cause problems in modern iOS applications
–Privacy issues related to gathering user data and how to mitigate potential pitfalls

Don’t let your app’s security leak become another headline. Whether you’re looking to bolster your app’s defenses or hunting bugs in other people’s code,iOS Application Securitywill help you get the job done well.Introduction
PART I: IOS FUNDAMENTALS
Chapter 1: The iOS Security Model
Chapter 2: Objective-C for the Lazy
Chapter 3: iOS Application Anatomy
PART II: SECURITY TESTING
Chapter 4: Building Your Test Platform
Chapter 5: Debugging with lldb and Friends
Chapter 6: Black-Box Testing
PART III: SECURITY QUIRKS OF THE COCOA API
Chapter 7: iOS Networking
Chapter 8: Interprocess Communication
Chapter 9: iOS-Targeted Web Apps
Chapter 10: Data Leakage
Chapter 11: Legacy Issues and Baggage from C
Chapter 12: Injection Attacks
PART IV: KEEPING DATA SAFE
Chapter 13: Encryption and Authentication
Chapter 14: Mobile Privacy ConcernsDavid Thielhas nearly 20 years of computer security experience. His research and bookMobile Applicationl3-