舉報

會員
INSTANT Apple Configurator How-to
Filledwithpractical,step-by-stepinstructionsandclearexplanationsforthemostimportantandusefultasks.Getthejobdoneandlearnasyougo.Ahow-Tobookwithpracticalrecipesaccompaniedwithrichscreenshotsforeasycomprehension.ThisbookfollowsthePacktHow-toapproach,offeringaninformativeyetpracticalguidethatiseasytounderstand.Thebooktakesameticulousapproachtoprovidingquickandsimplerecipe-basedsolutionsforsecurityanddeploymentofiOSdevices.InstantAppleiOSConfiguratorUtilityHow-tobookisidealforanyonewithaworkingknowledgeiniOSdevicedeploymentandmanagement.ItislikelyyouwillberesponsibleforthemaintenanceandsecurityofiOSdevices,ranginganywherefrom10to10,000.ThisistheultimateguidetoiOSsecuritymanagementanddevicedeployment.
目錄(36章)
倒序
- coverpage
- Instant Apple Configurator How-to
- Credits
- About the Authors
- About the Reviewer
- www.PacktPub.com
- Support files eBooks discount offers and more
- Preface
- What this book covers
- What you need for this book
- Who this book is for
- Conventions
- Reader feedback
- Customer support
- Chapter 1. Instant Apple Configurator How-to
- Signing up for an Apple ID (Must know)
- Installing Apple Configurator (Must know)
- Configuring the Apple Configurator preferences (Should know)
- Migrating existing profiles into Apple Configurator (Should know)
- Deciding whether to prepare supervise or assign (Must know)
- Creating a cart workflow (Should know)
- Leveraging Configurator in a one-to-one environment (Should know)
- Checking out devices (Should know)
- Creating a device backup (Should know)
- Restoring a device backup (Should know)
- Understanding profiles (Become an expert)
- Building a profile (Must know)
- Exploring all profiles (Should know)
- Exporting profiles (Must know)
- Creating auto enrollment profiles (Become an expert)
- Purchasing applications through the VPP (Should know)
- Importing applications (Should know)
- Deploying applications on prepared devices (Become an expert)
- Deploying applications on managed devices (Become an expert)
- Adding files to devices (Should know)
- Importing files back to the computer (Should know) 更新時間:2021-07-27 18:14:13
推薦閱讀
- Web漏洞分析與防范實戰:卷1
- 腦洞大開:滲透測試另類實戰攻略
- Metasploit Penetration Testing Cookbook(Third Edition)
- 可信計算3.0工程初步
- Practical Network Scanning
- 工業控制網絡安全技術
- 網絡空間安全實驗
- 計算機網絡安全基礎(第5版)
- 局域網交換機安全
- 數據保護:工作負載的可恢復性
- 網絡用戶行為的安全可信分析與控制
- 復雜信息系統網絡安全體系建設指南
- 安全網絡構建
- Instant OSSEC Host-based Intrusion Detection System
- 密碼朋克:自由與互聯網的未來
- 云原生安全
- 黑客與安全技術指南
- 網絡空間安全技術
- Implementing AppFog
- HTTPS權威指南:在服務器和Web應用上部署SSL/TLS和PKI
- Hands-On Web Penetration Testing with Metasploit
- 商用密碼權威指南:技術詳解、產品開發與工程實踐
- 網絡安全工具攻防實戰從新手到高手(微課超值版)
- Binary Analysis Cookbook
- 黑客攻防從入門到精通:命令版(第2版)
- Windows 7安全指南
- 計算機網絡安全
- Burp Suite Cookbook
- 工業互聯網信息安全技術
- 黑客攻防從入門到精通(實戰版)