Skip to Main Content (Press Enter)
iOS Application Security by David Thiel
Add iOS Application Security to bookshelf
Add to Bookshelf

iOS Application Security

Best Seller
iOS Application Security by David Thiel
Paperback $49.95
Feb 16, 2016 | ISBN 9781593276010

Buy from Other Retailers:

See All Formats (1) +
  • $49.95

    Feb 16, 2016 | ISBN 9781593276010

    Buy from Other Retailers:

  • Feb 16, 2016 | ISBN 9781593277543

    Buy from Other Retailers:

Product Details

Praise

“The book is strongly recommended for all iOS app developers, especially for those who use the Objective-C programming language.”
—Computing Reviews

“In summary, this is a book that every iOS developer needs to read and then act on. The next time you see an app that leaks private data everywhere, is vulnerable to a whole host of injection attacks, and uses crypto like it’s 1995, ask them why they didn’t consult this book before shipping.”
—;login:

iOS Application Security offers an excellent foundation for anyone interested in ethical hacking on mobile platforms. This is going to be a growing sector of the penetration testing industry, as mobile devices assume an ever-greater importance in corporate IT estates.”
—Network Security Newsletter

“Worthy read and covers a lot of ground in 200ish pages. Well recommended.”
—Michael Howard, author of Writing Secure Code

“A major asset to any iOS developer who wants to ensure his app’s ability to protect a user’s data. I would highly recommend anyone interested in the field of iOS app security to take a close look at iOS Application Security.”
—MacTrast

Table Of Contents

Introduction
PART I: IOS FUNDAMENTALS
Chapter 1: The iOS Security Model
Chapter 2: Objective-C for the Lazy
Chapter 3: iOS Application Anatomy
PART II: SECURITY TESTING
Chapter 4: Building Your Test Platform
Chapter 5: Debugging with lldb and Friends
Chapter 6: Black-Box Testing
PART III: SECURITY QUIRKS OF THE COCOA API
Chapter 7: iOS Networking
Chapter 8: Interprocess Communication
Chapter 9: iOS-Targeted Web Apps
Chapter 10: Data Leakage
Chapter 11: Legacy Issues and Baggage from C
Chapter 12: Injection Attacks
PART IV: KEEPING DATA SAFE
Chapter 13: Encryption and Authentication
Chapter 14: Mobile Privacy Concerns

Looking for More Great Reads?
21 Books You’ve Been Meaning to Read
Back to Top