Learning iOS Security

More Information
Learn
  • Configure the appropriate features to debug data and inspect your device
  • Configure and operate iOS applications using the best practices
  • Build Mobile Device Management configurations with a secure approach
  • Choose the appropriate tools in an iOS deployment with the help of easy-to-understand scenarios
  • Connect and manage Apple devices centrally
  • Provide appropriate input when a security policy is being made
  • Develop a toolset to begin tackling comprehensive forensic analysis
  • Transmit and store data efficiently using the privacy and iCloud settings
  • Connect your device to view network traffic and capture the camera
About

iOS has quickly become one of the most popular mobile operating systems, not only with users, but also with developers and companies. This also makes it a popular platform for malicious adversaries. iOS users and developers need to be constantly aware of their mobile security risks. Because of this, there is great demand for risk assessment specialists and security engineers.

This book is a hands-on guide that focuses on iOS Devices and application security. It also discusses many vulnerabilities and security-related shortcomings that could expose personal data to prying eyes or allow interception of an iOS devices communication. You will learn how to manage apps to reduce the risks from third-parties and then carry out practical steps and procedures to protect your device at a large scale using tools like Apple Configurator and MDM. By the end of this book, you will have a great understanding of the essentials of iOS apps and will be able to secure the platform easily and rapidly.

Features
  • Familiarize yourself with fundamental methods to leverage the security of iOS platforms and apps
  • Resolve common vulnerabilities and security-related shortcomings in iOS applications and operating systems
  • A pragmatic and hands-on guide filled with clear and simple instructions to develop a secure mobile deployment
Page Count 142
Course Length 4 hours 15 minutes
ISBN 9781783551743
Date Of Publication 27 Feb 2015

Authors

Charles S. Edge

Charles S. Edge has been working with Apple products since he was a child. Professionally, Charles started with the Mac OS and Apple server offerings in 1999 after working of years with various flavors of Unix. Charles began his consulting career with Support Technologies and Andersen Consulting. As the chief technology officer of 318, Inc., a consulting firm in Santa Monica, California, Charles built and nurtured a team of over 50 engineers, which was the largest Mac team in the world at that time. Charles is now a product manager at JAMF Software, with a focus on Bushel (http://www.bushel.com).

Charles has spoken at a variety of conferences including DefCon, BlackHat, LinuxWorld, MacWorld, MacSysAdmin, and Apple Worldwide Developers Conference. Charles has also written 12 books, over 3,000 blog posts, and a number of printed articles on Apple products.

Allister Banks

Allister Banks is an enthusiast. He's very excited to be in the exceedingly limited, exclusive club of coauthors of Charles S. Edge. After working for a decade with IT consulting companies on both the coasts of the U.S., he now works for a medical-focused institution with education and data center aspects. He has given speeches at LOPSA-East, MacTech Conference, and MacAdmins Conference at Penn State. He lives in New York. He contributes to various open source projects and speaks enough Japanese to order food.