Bayesian Content Filtering and the Art of Statistical Language Classification
Join author Jonathan Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language classification and machine learning combine to produce remarkably accurate spam filters.After reading Ending Spam, you’ll have a complete understanding of the mathematical approaches used by today’s spam filters as well as decoding, tokenization, various algorithms (including Bayesian analysis and Markovian discrimination) and the benefits of using open-source solutions to end spam.If you’re a programmer designing a new spam filter, a network admin implementing a spam-filtering solution, or just someone who’s curious about how spam filters work and the tactics spammers use to evade them, Ending Spam will serve as an informative analysis of the war against spammers.
||iPhone Open Application Development
Write Native Applications using the Open Source Tool Chain
2nd Edition, ISBN 978-0596155193
Developers everywhere are eager to create applications for the iPhone, and many of them prefer the open source, community-developed tool chain to Apple’s own toolkit. This new edition of iPhone Open Application Development covers the latest version of the open toolkit — now updated for Apple’s iPhone 2.x software and iPhone 3G — and explains in clear language how to create applications using Objective-C and the iPhone API.
Recovering Evidence, Personal Data, and Corporate Assets
With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with iPhones, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch.”This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!”Â -Andrew Sheldon, Director of Evidence Talks, computer forensics experts
||iPhone SDK Application Development
Building Applications for the AppStore
This practical book offers programmers the knowledge and code they need to create cutting-edge mobile applications, using Apple’s iPhone SDK. The iPhone is one of the hottest new pieces of technology: a fully functional portable Unix operating system with the most advanced handheld user interface in existence. iPhone SDK Application Development covers development environment for both the iPhone and iPod Touch, from windows and navigation bars to more advanced layers of the iPhone SDK, such as screen transitions, low-level graphics rendering using CoreSurface, the MultiTouch API, and digital sound and music rendering with Celestial and CoreAudio.
||Hacking and Securing iOS Applications
Stealing Data, Hijacking Software, and How to Prevent it
In order to defeat criminals, developers must first learn to think like criminals. Based on unique and previously undocumented research, this book by noted iOS expert Jonathan Zdziarski shows the numerous weaknesses that exist in typical iPhone and iPad apps, and how criminals exploit them to steal confidential information, empty out bank accounts, and hijack applications. In this book, Zdziarski shows developers where many exploitable flaws lie in their code in a clear, direct, and immediately applicable style. More importantly, this book will teach the reader how to take this knowledge and write more secure code to make breaching your applications more difficult. Black hat topics cover manipulating the Objective-C runtime, debugger abuses, hijacking SSL, breaking iOS’ keychain and file system encryption, and even social engineering. White hat topics cover properly implementing encryption, geo-encryption, incorporating PKI without depending on certificate authorities, how to detect and prevent debugging, infection testing and class validation, jailbreak detection, and much more.
Hacking and Securing iOS Applications is geared toward software engineers, corporate and government security auditors, penetration testers, and any developer looking to write secure applications. With the App Store reaching over a half-million applications, tools that work with personal or confidential data are becoming increasingly popular. Developers will greatly benefit from Jonathan’s book by learning about all of the weaknesses of iOS and the Objective-C environment. Whether you’re developing credit card payment processing applications, banking applications, applications for government use, or any other kind of software that works with confidential data, Hacking and Securing iOS Applications is a must-read for those who take secure programming seriously.