The first comprehensive security resource for Mac and iPhone developers
The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information
available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.
arms Apple developers with essential information to help them create Mac and iPhone applications as secure as the operating system they run on.
- While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first comprehensive reference to Apple’s application security frameworks and features
- Shows developers how to consider security throughout the lifecycle of a Cocoa application, including how Mac and iPhone security features work and how to leverage them
- Describes how to design, implement, and deploy secure Mac and iPhone software, covering how user configurations affect application security, the keychain feature, how to maximize filesystem security, how to write secure code, and much more
From the Back Cover
Design, implement, and deploy secure applications All applications face security threats, making security considerations an integral part of every stage of the software development process. With this book, Cocoa and Cocoa Touch developersHe shows you how to take advantage of the many security resources available and provides helpful insight to avoiding security pitfalls and handling unexpected issues that may arise.
Professional Cocoa Application Security:
- Details why security is important and provides rationale as to why you should secure your app
- Introduces the UNIX filesystem and examines the Mac OS X-specific filesystem security features
- Discusses the limitations of the keychain and encryption
- Reviews ways to look for, record, and fix security bugs in written code
- Describes the security impacts of different Mac OS X software deployment techniques
- Explains how to securely deliver software updates
No comments:
Post a Comment