iOS Security through Defensive Techniques : A practical guide to building resilient, tamper-proof, and secure iOS applications

個数:
  • ポイントキャンペーン

iOS Security through Defensive Techniques : A practical guide to building resilient, tamper-proof, and secure iOS applications

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 言語 ENG
  • 商品コード 9781806383177

Full Description

Protect your iOS apps from evolving attacks with a complete, practical toolkit of defensive techniques, cryptographic foundations, and real-world app hardening techniques.

Key Features

Build a strong iOS security baseline with threat modeling, privacy, and safe data handling.
Harden apps against iOS attack paths with validation, tamper resistance, runtime checks and more.
Protect sensitive data using correct cryptography, secure storage, and hardware backed keys.

Book DescriptionIf you build iOS apps, you also manage risk, from insecure data storage to reverse engineering and runtime tampering. This book treats security as part of the development workflow, not an afterthought, and focuses on practical techniques you can apply without needing deep cryptography or penetration testing expertise.

You will start by defining what needs protection: sensitive data, how it is categorized, how long it should be retained, and how privacy expectations and legal requirements shape design decisions. From there, you will study common attack techniques such as network interception, injection, configuration mistakes, URL scheme abuse, code tampering, repackaging, and runtime manipulation.

The book then moves into defenses: platform and language safety, code signing and entitlements, secure error and execution handling, data validation, transport security with TLS pinning, and runtime protections against debuggers and emulation. On the data side, you will use Keychain, file protection classes, and Secure Enclave features to protect secrets and keys, and you will evaluate clipboard and backup related risks. Finally, you will build a repeatable security program across the app lifecycle, from static and dynamic analysis to incident response planning and bug bounty triage, so you can ship trustworthy iOS apps at scale.
What you will learn

Understand core iOS security, privacy, and threat modeling concepts
Learn to classify sensitive data and set clear handling and retention rules
Apply platform safe coding patterns to reduce common app flaws
Protect sensitive data using Keychain, file protection, and hardware backed keys.
Implement secure storage using Keychain, file protection, and Secure Enclave
Use modern cryptography with correct key management and safe defaults
Harden apps with anti-debugging, RASP, and runtime integrity checks

Who this book is forThis book is for iOS developers, mobile engineers, and architects who build or maintain production apps. DevSecOps engineers and security consultants supporting mobile pipelines will also benefit. Readers should be comfortable with Swift, Xcode, and the iOS app lifecycle, and have hands-on development experience.

Contents

Table of Contents

The Importance of Secure Applications
Understanding Sensitive Data
Compliance and Legal Landscape
Common Attack Techniques
Platform and Language Safety
Error and Execution Handling
Secure Coding Practices
Data Protection Techniques
Security Assurance and Response
System Integrity and Boot Security
Runtime Security and Debug Protection
Secure Storage and Data Handling

最近チェックした商品