Learning iOS Security
- Length: 146 pages
- Edition: 1
- Language: English
- Publisher: Packt Publishing
- Publication Date: 2015-02-27
- ISBN-10: 1783551747
- ISBN-13: 9781783551743
- Sales Rank: #2896910 (See Top 100 Books)
Enhance the security of your iOS platform and applications using iOS-centric security techniques
About This Book
- Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
- Resolve common vulnerabilities and security-related shortcomings in iOS applications and operating systems
- A pragmatic and hands-on guide filled with clear and simple instructions to develop a secure mobile deployment
Who This Book Is For
This book is intended for mobile security professionals who want to learn how to secure iOS operating systems and its applications. Any knowledge of iOS architecture would be an added advantage.
In Detail
iOS has quickly become one of the most popular mobile operating systems, not only with users, but also with developers and companies. This also makes it a popular platform for malicious adversaries. iOS users and developers need to be constantly aware of their mobile security risks. Because of this, there is great demand for risk assessment specialists and security engineers.
This book is a hands-on guide that focuses on iOS Devices and application security. It also discusses many vulnerabilities and security-related shortcomings that could expose personal data to prying eyes or allow interception of an iOS devices communication. You will learn how to manage apps to reduce the risks from third-parties and then carry out practical steps and procedures to protect your device at a large scale using tools like Apple Configurator and MDM. By the end of this book, you will have a great understanding of the essentials of iOS apps and will be able to secure the platform easily and rapidly.
Table of Contents
Chapter 1. iOS Security Overview
Chapter 2. Introducing App Security
Chapter 3. Encrypting Devices
Chapter 4. Organizational Controls
Chapter 5. Mobile Device Management
Chapter 6. Debugging and Conclusion