Jump to ratings and reviews
Rate this book

Learning iOS Security

Rate this book
Enhance the security of your iOS platform and applications using iOS-centric security techniquesAbout This BookFamiliarize yourself with fundamental methods to leverage the security of iOS platforms and appsResolve common vulnerabilities and security-related shortcomings in iOS applications and operating systemsA pragmatic and hands-on guide filled with clear and simple instructions to develop a secure mobile deploymentWho This Book Is ForThis book is intended for mobile security professionals who want to learn how to secure iOS operating systems and its applications. Any knowledge of iOS architecture would be an added advantage.

What You Will LearnConfigure the appropriate features to debug data and inspect your deviceConfigure and operate iOS applications using the best practicesBuild Mobile Device Management configurations with a secure approachChoose the appropriate tools in an iOS deployment with the help of easy-to-understand scenariosConnect and manage Apple devices centrallyProvide appropriate input when a security policy is being madeDevelop a toolset to begin tackling comprehensive forensic analysisTransmit and store data efficiently using the privacy and iCloud settingsConnect your device to view network traffic and capture the cameraIn DetailiOS has quickly become one of the most popular mobile operating systems, not only with users, but also with developers and companies. This also makes it a popular platform for malicious adversaries. iOS users and developers need to be constantly aware of their mobile security risks. Because of this, there is great demand for risk assessment specialists and security engineers.

This book is a hands-on guide that focuses on iOS Devices and application security. It also discusses many vulnerabilities and security-related shortcomings that could expose personal data to prying eyes or allow interception of an iOS devices communication. You will learn how to manage apps to reduce the risks from third-parties and then carry out practical steps and procedures to protect your device at a large scale using tools like Apple Configurator and MDM. By the end of this book, you will have a great understanding of the essentials of iOS apps and will be able to secure the platform easily and rapidly.

205 pages, Kindle Edition

First published February 27, 2015

2 people are currently reading
5 people want to read

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
1 (33%)
3 stars
0 (0%)
2 stars
1 (33%)
1 star
1 (33%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.