2010, ISBN: 0470911093
In englischer Sprache. Verlag: Wiley, J, Introduction. Chapter 1: Secure by Design. About Cocoa Security. Profiling Your Application's Security Risks. Defining the Security Environment. D… mais…
Libreka.de |
ISBN: 9780470911099
[KW: PDF ,MACINTOSH PROGRAMMING ,SOFTWARE ENGINEERING ,COMPUTER SECURITY] <-> <-> PDF ,MACINTOSH PROGRAMMING ,SOFTWARE ENGINEERING ,COMPUTER SECURITY
eBook.de Sofort lieferbar (Download), E-Book zum Download Custos de envio: EUR 0.00 Details... |
2010, ISBN: 9780470911099
[ED: 1], 1., Auflage, eBook Download (EPUB,PDF), eBooks, [PU: John Wiley & Sons]
lehmanns.de Custos de envio:Download sofort lieferbar, , Versandkostenfrei innerhalb der BRD (EUR 0.00) Details... |
2010, ISBN: 9780470911099
[ED: 1], Auflage, eBook Download (EPUB,PDF), eBooks, [PU: Wrox]
lehmanns.de Custos de envio:Download sofort lieferbar, , Versandkostenfrei innerhalb der BRD (EUR 0.00) Details... |
2010, ISBN: 0470911093
In englischer Sprache. Verlag: Wiley, J, Introduction. Chapter 1: Secure by Design. About Cocoa Security. Profiling Your Application's Security Risks. Defining the Security Environment. D… mais…
ISBN: 9780470911099
[KW: PDF ,MACINTOSH PROGRAMMING ,SOFTWARE ENGINEERING ,COMPUTER SECURITY] <-> <-> PDF ,MACINTOSH PROGRAMMING ,SOFTWARE ENGINEERING ,COMPUTER SECURITY
2010
ISBN: 9780470911099
[ED: 1], 1., Auflage, eBook Download (EPUB,PDF), eBooks, [PU: John Wiley & Sons]
2010, ISBN: 9780470911099
[ED: 1], Auflage, eBook Download (EPUB,PDF), eBooks, [PU: Wrox]
Dados bibliográficos do melhor livro correspondente
Autor: | |
Título: | |
Número ISBN: |
Dados detalhados do livro - Professional Cocoa Application Security
EAN (ISBN-13): 9780470911099
ISBN (ISBN-10): 0470911093
Ano de publicação: 2010
Editor/Editora: Wiley, J
336 Páginas
Língua: eng/Englisch
Livro na base de dados desde 2012-05-21T23:07:29+01:00 (Lisbon)
Página de detalhes modificada pela última vez em 2014-12-03T00:55:26+00:00 (Lisbon)
Número ISBN/EAN: 9780470911099
Número ISBN - Ortografia alternativa:
0-470-91109-3, 978-0-470-91109-9
Ortografia alternativa e termos de pesquisa relacionados:
Título do livro: coco, cocoa
Dados da editora
Autor: Graham J. Lee
Título: Professional Cocoa Application Security
Editora: John Wiley & Sons
336 Páginas
Ano de publicação: 2010-05-25
Língua: Inglês
30,99 € (DE)
Not available (reason unspecified)
EA; E107; E-Book; Nonbooks, PBS / Informatik, EDV/Programmiersprachen; Computerprogrammierung und Softwareentwicklung; Informatik; Operating Systems / Macintosh & iOS; Mac OS X; API; Programmierung u. Software-Entwicklung; Computer Science; Programming & Software Development; Computer-Ratgeber; Betriebssysteme / Macintosh u. iOS; End-User Computing; Betriebssysteme / Macintosh u. iOS; Programmierung u. Software-Entwicklung
Introduction. Chapter 1: Secure by Design. About Cocoa Security. Profiling Your Application's Security Risks. Defining the Security Environment. Defining Threats. Defining and Mitigating Vulnerabilities. Summary. Chapter 2: Managing Multiple Users. Caveat for iPhone Developers. Why We Have Multiple Users. User Groups. Understanding Directory Services. Accessing User Preferences and Managed Preferences. Summary. Chapter 3: Using the Filesystem Securely. UNIX Permissions. Filesystem Flags. Access Control Lists. FileVault and Other Encryption Options. Network Filesystems. Layout and Security of a Typical Mac OS X Filesystem. Aliases and Bookmarks. Quarantining Downloaded Files. Securely Deleting Files. Disk Arbitration. Summary. Chapter 4: Handling Multiple Processes. Privilege Separation. Designing Multiple-Process Systems. Managing Process Lifecycles with Launchd. How to Use Setuid and Setgid. Communication between Processes. Playing in the Sandbox. Guaranteeing Code's Origin. Summary. Chapter 5: Storing Confidential Data in the Keychain. What Is the Keychain? Why Should I Use the Keychain? How to Take Advantage of the Keychain. Keychain on the iPhone. Summary. Performing Chapter 6: Privileged Tasks. How to Acquire Rights. Factored Applications with Authorization Services. The Authorization Database. Why Not to Launch Privileged Tasks with AuthorizationServices. The Padlock. Authorization Plug-Ins. Summary. Chapter 7: Auditing Im portant Operations. Examples of Auditing. Using Apple System Logger. Basic Security Module. Summary. Chapter 8: Securing Network Connections. Remote Authentication. Privilege Boundaries in Networked Applications. Does 'Bonjour' Mean It's Adieu to Network Security? Working with the Firewall. Network Configuration with SystemConfiguration. Taking Advantage of SSL. Summary. Chapter 9: Writing Secure Application Code. Secure Objective-C Coding. Secure C Coding. Code Reviews and Other Bug-Finding Techniques. Summary. Deploying Chapter 10: Software Securely. Writing Security Documentation. Identify Yourself with Code Signing. Giving Your Code to Your Users. Rolling Your Own Installer. Deploying Privileged Helpers without Installers. Responding to Security Problems. Summary. Chapter 11: Kernel Extensions. The Kernel Environment. Filesystem Access Authorization with Kauth. Summary. Chapter 12: Conclusion and Further Reading. Further Reading. Index.Outros livros adicionais, que poderiam ser muito similares com este livro:
Último livro semelhante:
9780470887042 Professional Cocoa Application Security (Lee, Graham J.)
< Para arquivar...