官术网_书友最值得收藏!

What this book covers

Chapter 1, iOS Security Overview, is a quick-and-dirty overview of the many steps to take to initially secure an iPad, iPhone, and iPod Touch. The purpose of this chapter isn't to go into too much depth with any given technology, but to provide a cheat sheet of sorts to get you started with iOS security.

Chapter 2, Introducing App Security, is a more thorough review of how to choose apps and secure them during an iOS deployment. Here, we look at an overview of sandboxing techniques and how to use Single App Mode and keybags. We also look at in-house Apps.

Chapter 3, Encrypting Devices, explains the encryption types and techniques that are used in iOS. Here, we look at Touch ID, Apple Pay, network encryption, and privacy concerns.

Chapter 4, Organizational Controls, introduces Apple Configurator and profile management. Here, we also look at the Find My iPhone app as it pertains to Activation Lock, ActiveSync policies (EAS Policies), and device supervision.

Chapter 5, Mobile Device Management, looks at Apple's Profile Manager and a simple third-party MDM called Bushel. Here, we look at Over the Air (OTA) profile management.

Chapter 6, Debugging and Conclusion, covers ways to troubleshoot and debug devices in larger deployments. In this chapter, we'll look at how to find logs and interpret them, how to get more data than you can use from devices, and then we will wrap up the book.

主站蜘蛛池模板: 常山县| 五峰| 平乐县| 清水河县| 苍山县| 滦平县| 高青县| 大石桥市| 博湖县| 房产| 如东县| 称多县| 太和县| 山阴县| 博湖县| 灵宝市| 河间市| 英德市| 磐安县| 旬邑县| 泾阳县| 绥阳县| 祁门县| 延川县| 鹿泉市| 安塞县| 旬阳县| 龙川县| 枣强县| 定西市| 谷城县| 亚东县| 金乡县| 沧源| 当阳市| 南木林县| 林芝县| 怀安县| 平江县| 刚察县| 永年县|