The first comprehensive security resource for Mac and iPhone developers
The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.
- While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first comprehensive reference to Apple’s application security frameworks and features
- Shows developers how to consider security throughout the lifecycle of a Cocoa application, including how Mac and iPhone security features work and how to leverage them
- Describes how to design, implement, and deploy secure Mac and iPhone software, covering how user configurations affect application security, the keychain feature, how to maximize filesystem security, how to write secure code, and much more
From the Back Cover
Design, implement, and deploy secure applications All applications face security threats, making security considerations an integral part of every stage of the software development process. With this book, Cocoa and Cocoa Touch developers can ensure that their applications provide a secure user experience by incorporating security measures from the start when designing an application. Author and Mac security guru Graham Lee encourages you to acquire a clear understanding of the objectives of your users so that you can conclude which security techniques will be relevant to your application.He shows you how to take advantage of the many security resources available and provides helpful insight to avoiding security pitfalls and handling unexpected issues that may arise.
Professional Cocoa Application Security:
- Details why security is important and provides rationale as to why you should secure your app
- Introduces the UNIX filesystem and examines the Mac OS X-specific filesystem security features
- Discusses the limitations of the keychain and encryption
- Reviews ways to look for, record, and fix security bugs in written code
- Describes the security impacts of different Mac OS X software deployment techniques
- Explains how to securely deliver software updates
No comments:
Post a Comment