
Professional Cocoa Application Security
by Graham J. LeeRent Book
New Book
We're Sorry
Sold Out
Used Book
We're Sorry
Sold Out
eBook
We're Sorry
Not Available
Summary
Table of Contents
Introduction | |
Secure by Design | |
About Cocoa Security | |
Profiling Your Application's Security Risks | |
Defining the Security Environment | |
Defining Threats | |
Defining and Mitigating Vulnerabilities | |
Summary | |
Managing Multiple Users | |
Caveat for iPhone Developers | |
Why We Have Multiple Users | |
User Groups | |
Understanding Directory Services | |
Accessing User Preferences and Managed Preferences | |
Summary | |
Using the Filesystem Securely | |
UNIX Permissions | |
Filesystem Flags | |
Access Control Lists | |
FileVault and Other Encryption Options | |
Network Filesystems | |
Layout and Security of a Typical Mac OS X Filesystem | |
Aliases and Bookmarks | |
Quarantining Downloaded Files | |
Securely Deleting Files | |
Disk Arbitration | |
Summary | |
Handling Multiple Processes | |
Privilege Separation | |
Designing Multiple-Process Systems | |
Managing Process Lifecycles with Launchd | |
How to Use Setuid and Setgid | |
Communication between Processes | |
Playing in the Sandbox | |
Guaranteeing Code's Origin | |
Summary | |
Storing Confidential Data in the Keychain | |
What Is the Keychain? | |
Why Should I Use the Keychain? | |
How to Take Advantage of the Keychain | |
Keychain on the iPhone | |
Summary | |
Performing | |
Privileged Tasks | |
How to Acquire Rights | |
Factored Applications with Authorization Services | |
The Authorization Database | |
Why Not to Launch Privileged Tasks with Authorization Services | |
The Padlock | |
Authorization Plug-Ins | |
Summary | |
Auditing Im portant Operations | |
Examples of Auditing | |
Using Apple System Logger | |
Basic Security Module | |
Summary | |
Securing Network Connections | |
Remote Authentication | |
Privilege Boundaries in Networked Applications | |
Does 'Bonjour' Mean It's Adieu to Network Security? | |
Working with the Firewall | |
Network Configuration with SystemConfiguration | |
Taking Advantage of SSL | |
Summary | |
Writing Secure Application Code | |
Secure Objective-C Coding | |
Secure C Coding | |
Code Reviews and Other Bug-Finding Techniques | |
Summary | |
Deploying | |
Software Securely | |
Writing Security Documentation | |
Identify Yourself with Code Signing | |
Giving Your Code to Your Users | |
Rolling Your Own Installer | |
Deploying Privileged Helpers without Installers | |
Responding to Security Problems | |
Summary | |
Kernel Extensions | |
The Kernel Environment | |
Filesystem Access Authorization with Kauth | |
Summary | |
Conclusion and Further Reading | |
Further reading | |
Index | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.