Buch, Englisch, Book, Format (B × H): 150 mm x 210 mm, Gewicht: 381 g
Protect your iPhone, iPad, and Apple Watch
Buch, Englisch, Book, Format (B × H): 150 mm x 210 mm, Gewicht: 381 g
ISBN: 978-1-4842-2856-2
Verlag: APress
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1 title: Resetting Your iPhone Chapter Goal: To get the user secured immediately before they even read into the book, for free.· Rebooting your iPhone· Backing everything up to iCloud· Reseting all settings Chapter 2 title: Securing Your Intellectual Property on Your iPhoneChapter Goal: Protect intellectual property on and while transmitting via iPhones.· Learning about intellectual property · Securing my own intellectual property· Transmitting intellectual property properly via the US Copyright Office registration Chapter 3 title: Remote Wiping an iPhone in an Emergency· Recognizing an emergency· Wiping your iPhone· Wiping your Watch· Recovering your data from iCloud Chapter 4) Securing Corporate Email · Encrypting all email communications· Using secure encrypted application to send and receive emails Chapter 5) Working with Corporate Executive Policy · Respecting the executive orders· Reading executive orders· Paying attention to various corporate rules on corporate networks· Defining corporate network rules· Setting business user policy Chapter 6) Accessing the Root User· Rooting your iPhone · Jailbreaking· Using SSH on your iPhone to manage AWS Instances · Manaing your AWS Infrastructure from your iPhone· Securing your iPhone to a security engineer’s standard from Apple Chapter 7) Engineering Secure iOS and watchOS Applications· This chapter will be a guest interview from PJ Cabrera, one of your authors! He worked for Apple doing iPhone app development for a long time and has written many books on iPhone programming and is a good friend of mine. It should be no trouble getting him to contribute this chapter, if not, I am happy to write it myself.· Considering security when using XCode for programming basic apps · Submitting your apps to the app store for review· Monitoring app security and providing updates Chapter 8) Watching out for Shoulder Surfers and Emoji Burgers· Understanding social engineering· Resolving identity theft · Recovering financial losses from your insurer· Handling iPhone theft· Finding your iPhone· Remote Wiping your iPhone Chapter 9) Running a DDoS From your iPhone or watchOS· Using Neustar Real browser stress tests against your iPhone· Remoting into your iPhone· Getting AppleCare support and how to get the best support possible from them Chapter 10) DDoSing your iPhone or watchOS· Understanding a denial of service attack· Securing your apps against attack· Handling a DDoS on your iPhone Chapter 11) Securing Bluetooth · Writing secure Bluetooth apps · Protecting phones against Bluetooth attacks Chapter 12) Phreaking The iPhone · Understanding modern phreaking methods· Using Secure iPhone telephony apps Chapter 13) Working with White Hat Guidelines· Staying legal on a corporate network· Avoiding illegal hacks and patches· Staying legal on a public network Chapter 14) Managing Corporate Endpoints· Exploring available software · Securing enterprise iOS




