官术网_书友最值得收藏!

What this book covers

Chapter 1, iOS Security Overview, is a quick-and-dirty overview of the many steps to take to initially secure an iPad, iPhone, and iPod Touch. The purpose of this chapter isn't to go into too much depth with any given technology, but to provide a cheat sheet of sorts to get you started with iOS security.

Chapter 2, Introducing App Security, is a more thorough review of how to choose apps and secure them during an iOS deployment. Here, we look at an overview of sandboxing techniques and how to use Single App Mode and keybags. We also look at in-house Apps.

Chapter 3, Encrypting Devices, explains the encryption types and techniques that are used in iOS. Here, we look at Touch ID, Apple Pay, network encryption, and privacy concerns.

Chapter 4, Organizational Controls, introduces Apple Configurator and profile management. Here, we also look at the Find My iPhone app as it pertains to Activation Lock, ActiveSync policies (EAS Policies), and device supervision.

Chapter 5, Mobile Device Management, looks at Apple's Profile Manager and a simple third-party MDM called Bushel. Here, we look at Over the Air (OTA) profile management.

Chapter 6, Debugging and Conclusion, covers ways to troubleshoot and debug devices in larger deployments. In this chapter, we'll look at how to find logs and interpret them, how to get more data than you can use from devices, and then we will wrap up the book.

主站蜘蛛池模板: 云林县| 房产| 会理县| 延庆县| 云浮市| 蚌埠市| 红桥区| 临桂县| 阿图什市| 遂川县| 巴楚县| 临湘市| 巴楚县| 库车县| 新巴尔虎左旗| 叙永县| 星座| 德惠市| 彭州市| 徐州市| 紫金县| 册亨县| 定结县| 安多县| 澄城县| 永城市| 栾川县| 根河市| 武乡县| 深水埗区| 龙山县| 闵行区| 深泽县| 三原县| 临夏县| 新化县| 馆陶县| 汉川市| 时尚| 兴安县| 静海县|