Des idées de lecture pour ce début d'année !
If you´re an app developer with a solid foundation in Objective-C, this book is an absolute must-chances are very high that your company´s iOS applications are vulnerable to attack. That´s because malicious attackers now use an arsenal of tools to reverse-engineer, trace, and manipulate applications in ways that most programmers aren´t aware of. This guide illustrates several types of iOS attacks, as well as the tools and techniques that hackers use. You´ll learn best practices to help protect your applications, and discover how important it is to understand and strategize like your adversary. Examine subtle vulnerabilities in real-world applications-and avoid the same problems in your apps Learn how attackers infect apps with malware through code injection Discover how attackers defeat iOS keychain and data-protection encryption Use a debugger and custom code injection to manipulate the runtime Objective-C environment Prevent attackers from hijacking SSL sessions and stealing traffic Securely delete files and design your apps to prevent forensic data leakage Avoid debugging abuse, validate the integrity of run-time classes, and make your code harder to trace
Il n'y a pas encore de discussion sur ce livre
Soyez le premier à en lancer une !
Des idées de lecture pour ce début d'année !
Si certaines sont impressionnantes et effrayantes, d'autres sont drôles et rassurantes !
A gagner : la BD jeunesse adaptée du classique de Mary Shelley !
Caraïbes, 1492. "Ce sont ceux qui ont posé le pied sur ces terres qui ont amené la barbarie, la torture, la cruauté, la destruction des lieux, la mort..."