Professional Cocoa Application Security

Front Cover
John Wiley & Sons, Jun 8, 2010 - Computers - 336 pages
0 Reviews
The first comprehensive security resource for Mac and iPhone developers

The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.

  • While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first comprehensive reference to Apple’s application security frameworks and features
  • Shows developers how to consider security throughout the lifecycle of a Cocoa application, including how Mac and iPhone security features work and how to leverage them
  • Describes how to design, implement, and deploy secure Mac and iPhone software, covering how user configurations affect application security, the keychain feature, how to maximize filesystem security, how to write secure code, and much more

Professional Cocoa Application Security arms Apple developers with essential information to help them create Mac and iPhone applications as secure as the operating system they run on.

  

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

II
1
III
2
V
3
VI
4
VII
7
VIII
10
IX
14
X
19
LXXXVII
156
LXXXIX
158
XC
159
XCII
162
XCIII
168
XCIV
169
XCV
170
XCVII
171

XII
21
XIII
25
XV
26
XVI
27
XVII
28
XVIII
31
XIX
32
XXI
39
XXIII
40
XXIV
41
XXV
42
XXVII
48
XXVIII
53
XXIX
56
XXX
57
XXXI
59
XXXII
61
XXXIII
63
XXXV
67
XXXVI
68
XXXVIII
69
XXXIX
71
XL
73
XLI
74
XLII
76
XLIII
77
XLV
79
XLVI
88
XLVII
89
XLVIII
90
L
93
LI
94
LII
96
LIII
97
LV
99
LVI
101
LVII
106
LVIII
109
LXI
113
LXIII
114
LXIV
116
LXVI
122
LXVII
123
LXIX
126
LXX
127
LXXII
131
LXXIII
133
LXXIV
135
LXXV
140
LXXVII
142
LXXVIII
143
LXXIX
145
LXXXI
146
LXXXII
147
LXXXIII
151
LXXXV
152
LXXXVI
155
XCVIII
172
XCIX
175
CI
176
CII
177
CIII
178
CIV
179
CV
180
CVI
182
CVIII
186
CIX
189
CXI
190
CXII
192
CXIII
195
CXIV
197
CXV
204
CXVII
205
CXVIII
206
CXIX
209
CXX
210
CXXI
211
CXXII
217
CXXIII
219
CXXV
220
CXXVI
223
CXXVII
227
CXXVIII
228
CXXIX
230
CXXX
231
CXXXI
232
CXXXII
233
CXXXIV
234
CXXXV
238
CXXXVI
246
CXXXIX
251
CXL
252
CXLI
253
CXLIII
257
CXLIV
259
CXLV
261
CXLVII
262
CXLVIII
264
CXLIX
265
CL
269
CLII
270
CLIII
274
CLIV
276
CLV
280
CLVII
281
CLVIII
283
CLIX
285
CLX
286
CLXI
288
CLXIII
289
CLXIV
291
CLXV
293
CLXVI
294
CLXVII
297

Common terms and phrases

About the author (2010)

Graham J. Lee is an independent security contractor, focusing on Mac and iPhone applications. He is a regular speaker on Mac security, and writes the security column for the Mac Developer Network.

Bibliographic information