- Learning iOS Security
- Allister Banks Charles S. Edge
- 240字
- 2021-07-23 20:13:08
What this book covers
Chapter 1, iOS Security Overview, is a quick-and-dirty overview of the many steps to take to initially secure an iPad, iPhone, and iPod Touch. The purpose of this chapter isn't to go into too much depth with any given technology, but to provide a cheat sheet of sorts to get you started with iOS security.
Chapter 2, Introducing App Security, is a more thorough review of how to choose apps and secure them during an iOS deployment. Here, we look at an overview of sandboxing techniques and how to use Single App Mode and keybags. We also look at in-house Apps.
Chapter 3, Encrypting Devices, explains the encryption types and techniques that are used in iOS. Here, we look at Touch ID, Apple Pay, network encryption, and privacy concerns.
Chapter 4, Organizational Controls, introduces Apple Configurator and profile management. Here, we also look at the Find My iPhone app as it pertains to Activation Lock, ActiveSync policies (EAS Policies), and device supervision.
Chapter 5, Mobile Device Management, looks at Apple's Profile Manager and a simple third-party MDM called Bushel. Here, we look at Over the Air (OTA) profile management.
Chapter 6, Debugging and Conclusion, covers ways to troubleshoot and debug devices in larger deployments. In this chapter, we'll look at how to find logs and interpret them, how to get more data than you can use from devices, and then we will wrap up the book.
- Docker and Kubernetes for Java Developers
- 羅克韋爾ControlLogix系統應用技術
- 精通API架構:設計、運維與演進
- JavaScript從入門到精通(第3版)
- Mastering macOS Programming
- Learning Unity 2D Game Development by Example
- Building Microservices with .NET Core
- C# and .NET Core Test Driven Development
- Kivy Cookbook
- Mastering VMware Horizon 7(Second Edition)
- DB2SQL性能調優秘笈
- Mastering Machine Learning with R
- Visual C++程序設計全程指南
- Clojure Data Structures and Algorithms Cookbook
- 3D Printing Designs:Design an SD Card Holder