Book description
The first comprehensive security resource for Mac and iPhone developers
The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.
While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first comprehensive reference to Apple's application security frameworks and features
Shows developers how to consider security throughout the lifecycle of a Cocoa application, including how Mac and iPhone security features work and how to leverage them
Describes how to design, implement, and deploy secure Mac and iPhone software, covering how user configurations affect application security, the keychain feature, how to maximize filesystem security, how to write secure code, and much more
Professional Cocoa Application Security arms Apple developers with essential information to help them create Mac and iPhone applications as secure as the operating system they run on.
Table of contents
- Copyright
- ABOUT THE AUTHOR
- ABOUT THE TECHNICAL EDITOR
- CREDITS
- ACKNOWLEDGMENTS
- INTRODUCTION
-
1. Secure by Design
- 1.1. ABOUT COCOA SECURITY
- 1.2. PROFILING YOUR APPLICATION'S SECURITY RISKS
- 1.3. DEFINING THE SECURITY ENVIRONMENT
- 1.4. DEFINING THREATS
- 1.5. DEFINING AND MITIGATING VULNERABILITIES
- 1.6. SUMMARY
- 2. Managing Multiple Users
-
3. Using the Filesystem Securely
- 3.1. UNIX PERMISSIONS
- 3.2. FILESYSTEM FLAGS
- 3.3. ACCESS CONTROL LISTS
- 3.4. FILEVAULT AND OTHER ENCRYPTION OPTIONS
- 3.5. NETWORK FILESYSTEMS
- 3.6. LAYOUT AND SECURITY OF A TYPICAL MAC OS X FILESYSTEM
- 3.7. ALIASES AND BOOKMARKS
- 3.8. QUARANTINING DOWNLOADED FILES
- 3.9. SECURELY DELETING FILES
- 3.10. DISK ARBITRATION
- 3.11. SUMMARY
- 4. Handling Multiple Processes
- 5. Storing Confidential Data in the Keychain
- 6. Performing Privileged Tasks
- 7. Auditing Important Operations
- 8. Securing Network Connections
- 9. Writing Secure Application Code
- 10. Deploying Software Securely
- 11. Kernel Extensions
- 12. Conclusion and Further Reading
Product information
- Title: Professional Cocoa® Application Security
- Author(s):
- Release date: June 2010
- Publisher(s): Wrox
- ISBN: 9780470525951
You might also like
book
Mobile Application Security
Secure today's mobile devices and applications Implement a systematic approach to security in your mobile application …
book
iOS Application Security
iOS Application Security covers everything you need to know to design secure iOS apps from the …
book
Hacking Exposed Malware & Rootkits: Security Secrets and Solutions, Second Edition, 2nd Edition
Arm yourself for the escalating war against malware and rootkits Thwart debilitating cyber-attacks and dramatically improve …
book
Computer Security Literacy
Helping average computer users make sound security decisions, this book focuses on practical security topics users …