Skip to Content
Learning iOS security: enhance the security of your iOS platform and applications using iOS-centric security techniques

Learning iOS security: enhance the security of your iOS platform and applications using iOS-centric security techniques

Banks, Allister, author; Edge, Charles S., Jr., author

Annotation This book is intended for mobile security professionals who want to learn how to secure iOS operating systems and its applications. Any knowledge of iOS architecture would be an added advantage

eBook, Electronic resource, Book. English. Electronic books.
Published Birmingham, UK : Packt Publishing 2015
Rate this

This resource is available electronically from the following locations

Details

Statement of responsibility: Allister Banks, Charles S. Edge
ISBN: 1783553952, 9781783551743, 9781783553952
Note: Includes index.
Note: Online resource; title from cover page (Safari, viewed March 24, 2015).
Physical Description: 1 online resource (1 volume) : illustrations.
Series: Community experience distilled
Subject: Computer security.; iOS (Electronic resource); IOS (Electronic resource); Mobile computing.; COMPUTERS Internet Security.
Alternative Title: Enhance the security of your iOS platform and applications using iOS-centric security techniques
Series Title: Community experience distilled.
Local note: eBooks on EBSCOhost EBSCO eBooks for FE Collection (UK)

Contents

  1. Cover
  2. Copyright
  3. Credits
  4. About the Authors
  5. About the Reviewers
  6. www.PacktPub.com
  7. Table of Contents
  8. Preface
  9. Chapter 1: iOS Security Overview
  10. Pairing
  11. Backing up your device
  12. iCloud backups
  13. Taking backups using iTunes
  14. Viewing iOS data in iTunes
  15. Initial security checklist
  16. Configuring a passcode
  17. Configuring privacy settings
  18. Safari and built-in App protections
  19. Predictive search and spotlight
  20. Summary
  21. Chapter 2: Introducing App Security
  22. Installing apps
  23. Blocking access to the App Store
  24. Single App mode, App Lock, and Guided Access
  25. App communication
  26. Handoff and Continuity
  27. Preparing the Profile Manager ServerPreparing Profile Manager
  28. Completing Post Configuration tasks
  29. Using Profile Manager
  30. Enrolling into Profile Manager
  31. Device management
  32. Passcode policies
  33. Introducing Bushel
  34. Setup
  35. The enrollment process
  36. Restrictions
  37. Volume Purchasing Program and MDM
  38. Summary
  39. Chapter 6: Debugging and Conclusion
  40. Xcode
  41. Dive deeper with libimobiledevice
  42. Installing libimobiledevice using Homebrew
  43. Using idevicesyslog and idevicepair
  44. Using idevicedate and ideviceinstaller
  45. App communications
  46. Identifying devices
  47. Listening to network communications
  48. Apple IDs and apps
  49. ForensicsApplication security
  50. Viewing an app
  51. Summary
  52. Index