Pro iOS Security and Forensics : Enterprise iPhone and iPad Safety /: Enterprise iPhone and iPad Safety. (2018)
- Record Type:
- Book
- Title:
- Pro iOS Security and Forensics : Enterprise iPhone and iPad Safety /: Enterprise iPhone and iPad Safety. (2018)
- Main Title:
- Pro iOS Security and Forensics : Enterprise iPhone and iPad Safety
- Further Information:
- Note: Eric Butow.
- Authors:
- Butow, Eric
- Contents:
- Chapter 1: Preparing Security FeaturesGoal: The reader will know how to set up built-in access and shared security features for employee iPhones.·Screen Lock Methods and Features·Restrict Access to Apps·Change App Privacy Settings·Erase Data After Login Failure·Encrypting Your DeviceChapter 2: Using Security Apps and BackupGoal: The reader will know about how to download third-party security apps and back up an iPhone.·Pre-Installed Security Apps·Finding Security Apps in the App Store·Adding Anti-Malware Apps·Backing Up Your iPhone Regularly·Using iTunes SecurelyChapter 3: Connect to Your Network SecurelyGoal: The reader will understand the different types of network connections and how to secure them.·Different Connection Types·Create a Virtual Private Network·Secure your Wi-Fi Connection·Managing Your 4G/LTE NetworkChapter 4: Creating PoliciesGoal: The reader will understand how to create effective policies and communicate them to others.·Corporate vs. Personal iPhones·Provisioning Policies for Device Management·Policies for Loss and Theft·Communicate Your PoliciesChapter 5: Communicating About SecurityGoal: The reader will learn about iPhone safety and security practices to communicate to employees.·Look for the Hooks of Email Phishers·Staying Safe Browsing the Web·Managing App Permissions·Updating iOS and Apps RegularlyChapter 6: Recovering from Loss or AttackGoal: The reader will understand how to use apps to find, lock, and recover an iPhone.·Using Find myChapter 1: Preparing Security FeaturesGoal: The reader will know how to set up built-in access and shared security features for employee iPhones.·Screen Lock Methods and Features·Restrict Access to Apps·Change App Privacy Settings·Erase Data After Login Failure·Encrypting Your DeviceChapter 2: Using Security Apps and BackupGoal: The reader will know about how to download third-party security apps and back up an iPhone.·Pre-Installed Security Apps·Finding Security Apps in the App Store·Adding Anti-Malware Apps·Backing Up Your iPhone Regularly·Using iTunes SecurelyChapter 3: Connect to Your Network SecurelyGoal: The reader will understand the different types of network connections and how to secure them.·Different Connection Types·Create a Virtual Private Network·Secure your Wi-Fi Connection·Managing Your 4G/LTE NetworkChapter 4: Creating PoliciesGoal: The reader will understand how to create effective policies and communicate them to others.·Corporate vs. Personal iPhones·Provisioning Policies for Device Management·Policies for Loss and Theft·Communicate Your PoliciesChapter 5: Communicating About SecurityGoal: The reader will learn about iPhone safety and security practices to communicate to employees.·Look for the Hooks of Email Phishers·Staying Safe Browsing the Web·Managing App Permissions·Updating iOS and Apps RegularlyChapter 6: Recovering from Loss or AttackGoal: The reader will understand how to use apps to find, lock, and recover an iPhone.·Using Find my iPhone·Accessing Your iPhone Remotely·Using Recovery Mode·Accessing DFU Mode·Checking Your iPhone Apps, Settings, and Data. … (more)
- Publisher Details:
- Berkeley, CA : Apress
- Publication Date:
- 2018
- Copyright Date:
- 2018
- Extent:
- 1 online resource (160 pages)
- Subjects:
- Computer science
Computers -- Security -- General
Computer security
Apple computer
Data protection
Computer security
Computers -- Programming -- Apple Programming
Macintosh programming - Languages:
- English
- ISBNs:
- 9781484237571
- Related ISBNs:
- 9781484237564
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.368931
- Ingest File:
- 01_349.xml