iOS Security - Matthew Sacks

iOS Security

Protect your iPhone, iPad, and Apple Watch

(Autor)

Buch | Softcover
2018 | 1st ed.
Apress (Verlag)
978-1-4842-2856-2 (ISBN)
32,09 inkl. MwSt
  • Titel wird leider nicht erscheinen
  • Artikel merken
Immediately secure your iPhone, regardless of who you are-IT professional dealing with corporate devices or average user. This book covers how to deal with various types of attacks, use secure networking practices, and stay legal while hacking the hackers. Securing your iPhone is not easy. While iOS is a very secure operating system, this book takes the most advanced cybersecurity and operational security standpoints and codifies them into a reference guide that will help all users securely use their iPhones on home and corporate networks of all types and locations.
Not only are end users addressed, but this book also helps developers and IT professionals send iPhones and apps out the door already secured and ready to face the dangers of the cyberworld. Both end users and professionals are given information on the different types of popular attacks from software to social engineering and how to effectively deal with threats while trying to avoid them to begin with.
What You'll Learn



Secure your iPhone immediately

Use a proper VPN and select a good VPN provider while keeping in mind all technical and communications laws

Run a pen test on your iPhone to find new bugs and submit them to Apple

Protect against the finest social engineers in the world



Who This Book Is For
Everyone who uses an iPhone, watchOS, or Apple TV Device in their home, office, or both.

Matthew D Sacks is a professional systems administrator working in the specialized field of cybersecurity. He has also worked as a Java and Python programmer. Matthew has presented at USENIX LISA and ApacheCon and is the founder of the USENIX Blog team.

Chapter 1 title: Resetting Your iPhone

Chapter Goal: To get the user secured immediately before they even read into the book, for free.

* Rebooting your iPhone

* Backing everything up to iCloud

* Reseting all settings



Chapter 2 title: Securing Your Intellectual Property on Your iPhone

Chapter Goal: Protect intellectual property on and while transmitting via iPhones.

* Learning about intellectual property

* Securing my own intellectual property

* Transmitting intellectual property properly via the US Copyright Office r

egistration



Chapter 3 title: Remote Wiping an iPhone in an Emergency

* Recognizing an emergency

* Wiping your iPhone

* Wiping your Watch

* Recovering your data from iCloud



Chapter 4) Securing Corporate Email

* Encrypting all email communications

* Using secure encrypted application to send and receive emails



Chapter 5) Working with Corporate Executive Policy

* Respecting the executive orders

* Reading executive orders

* Paying attention to various corporate rules on corporate networks

* Defining corporate network rules

* &nbs

p; Setting business user policy



Chapter 6) Accessing the Root User

* Rooting your iPhone

* Jailbreaking

* Using SSH on your iPhone to manage AWS Instances

* Manaing your AWS Infrastructure from your iPhone

* Securing your iPhone to a security engineer's standard from Apple





Chapter 7) Engineering Secure iOS and watchOS Applications

* This chapter will be a guest interview from PJ Cabrera, one of your authors! He worked for Apple doing iPhone app development for a long time and has written many books on iPhone programming and is a good friend of mine. It should be no trouble getting him to contribute this chapter, if not, I am happy to write it myself.

*

Considering security when using XCode for programming basic apps

* Submitting your apps to the app store for review

* Monitoring app security and providing updates



Chapter 8) Watching out for Shoulder Surfers and Emoji Burgers

* Understanding social engineering

* Resolving identity theft

* Recovering financial losses from your insurer

* Handling iPhone theft

* Finding your iPhone

* Remote Wiping your iPhone



Chapter 9) Running a DDoS From your iPhone or watchOS

* Using Neustar Real browser stress tests against your iPhone

* Remoting into your iPhone

* &n

bsp; Getting AppleCare support and how to get the best support possible from them



Chapter 10) DDoSing your iPhone or watchOS

* Understanding a denial of service attack

* Securing your apps against attack

* Handling a DDoS on your iPhone



Chapter 11) Securing Bluetooth

* Writing secure Bluetooth apps

* Protecting phones against Bluetooth attacks



Chapter 12) Phreaking The iPhone

* Understanding modern phreaking methods

* Using Secure iPhone telephony apps



Chapter 13) Working with White Hat Guidelines

* Staying legal on a corporate network

* Av

oiding illegal hacks and patches

* Staying legal on a public network



Chapter 14) Managing Corporate Endpoints

* Exploring available software

* Securing enterprise iOS

Erscheint lt. Verlag 10.12.2018
Zusatzinfo Approx. 320 p.
Verlagsort Berkley
Sprache englisch
Maße 155 x 235 mm
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Smartphones / Tablets
Schlagworte Administrator • Apple Watch • cybersecurity • iPad • iPhone • IT • Network Security • security
ISBN-10 1-4842-2856-1 / 1484228561
ISBN-13 978-1-4842-2856-2 / 9781484228562
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich