Media praise for Hacking and Securing iOS Applications

Have a blog? Join our Reader Review Program

"I had an absolute blast reading this book. What I liked most about the book is that it got down to the knitty-gritty details really fast...If you’re curious with tinkering around with the internals of iOS or if you’re an application developer looking to secure your application, you’ll definitely find this book useful. All in all, I highly recommend this book to any developer or security professional."
-- Dustin Schultz, The Xploit | Security Blog

"Jonathan Zdziarski... has written yet another must-have textbook for iPhone developers and security practitioners. Unlike most other hacking books, this book spends considerable time building the foundations for every aspect of iOS"
-- Phoram Mehta, Computing Reviews, Information Security Architect

"I started this just after the Path fiasco. It seemed timely to brush up on my security knowledge, especially for iOS intricacies, recommended practices and understanding obvious flaws. At the same time, O'Reilly had published "Hacking and Securing iOS Applications" by Jonathan Zdziarski, so I got a copy. This book provides exactly what I wanted; it's a great next-step if you've been developing for iOS or the Mac for a while. Fortunately it assumes that, which allows the book to quickly jump into examples and solutions." Full Review >
-- Nick Charlton, nickcharlton.net

"This book shows the other side of Apple's devices. Less secure one. We all are told that iOS based devices are secure due to restrictions applied by Apple. This is not exactly true. Well, there is always the other side of the coin. When I started the book I simply dived into it. I read it over one evening. Jonathan takes you on the journey over the low level layers of iOS development and shows what bad guys can do when they put their hands on your "precious". He presents how to jailbreak device, how to access common data, how to retrieve information from the device, how to manipulate it and how to compromise it. After various malicious behavior is described, Jonathan shows how to make your own applications more bullet proof. How to avoid caching, how to encrypt better, how to detect jailbreaked devices. Last topics is particularly interesting for people who develop proprietary software and want to make sure it will not be compromised by irresponsible users. You will also learn few interesting debugging techniques and find loots of references to other sources related to the topic. Book is both rewarding and demanding at the same time. If you are an iOS newbie, you'd better learn more about Objective-C, shell and iOS SDK before you start this one. Contrary, if you are familiar with mentioned topics already, and you know some basics of assembler, go ahead and buy this one. Note!! To fully benefit from the book you will need a device that you can jailbreak. Otherwise you won't be able to follow all exercises." Full Review >
-- Michal Konrad Owsiak, www.owsiak.org