IOS Application Security I OS The Definitive Guide For Hackers And Developers
iOS%20Application%20Security%20The%20Definitive%20Guide%20for%20Hackers%20and%20Developers
iOS%20Application%20Security%20The%20Definitive%20Guide%20for%20Hackers%20and%20Developers
iOS%20Application%20Security%20The%20Definitive%20Guide%20for%20Hackers%20and%20Developers
User Manual: Pdf
Open the PDF directly: View PDF
Page Count: 297 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- About the Author
- About the Technical Reviewer
- Brief Contents
- Contents in Detail
- Foreword by Alex Stamos
- Acknowledgments
- Introduction
- Part I: iOS Fundamentals
- Chapter 1: The iOS Security Model
- Chapter 2: Objective-C for the Lazy
- Chapter 3: iOS Application Anatomy
- Part II: Security Testing
- Chapter 4: Building Your Test Platform
- Chapter 5: Debugging with lldb and Friends
- Chapter 6: Black-Box Testing
- Part III: Security Quirks of the Cocoa API
- Chapter 7: iOS Networking
- Chapter 8: Interprocess Communication
- Chapter 9: iOS-Targeted Web Apps
- Chapter 10: Data Leakage
- The Truth About NSLog and the Apple System Log
- How Sensitive Data Leaks Through Pasteboards
- Finding and Plugging HTTP Cache Leaks
- Keylogging and the Autocorrection Database
- Misusing User Preferences
- Dealing with Sensitive Data in Snapshots
- Leaks Due to State Preservation
- Secure State Preservation
- Getting Off iCloud to Avoid Leaks
- Closing Thoughts
- Chapter 11: Legacy Issues and Baggage from C
- Chapter 12: Injection Attacks
- Part IV: Keeping Data Safe
- Chapter 13: Encryption and Authentication
- Chapter 14: Mobile Privacy Concerns
- Index
- Support the Electronic Frontier Foundation
- Updates