رکورد قبلیرکورد بعدی

" Pro iOS security and forensics : "


Document Type : BL
Record Number : 851110
Main Entry : Butow, Eric
Title & Author : Pro iOS security and forensics : : enterprise iPhone and iPad safety /\ Eric Butow.
Publication Statement : New York, NY :: Apress,, [2018]
Page. NO : 1 online resource
ISBN : 1484237579
: : 9781484237571
: 1484237560
: 9781484237564
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Intro; Table of Contents; About the Author; Acknowledgments; Chapter 1: Preparing Security Features; What iPhones Are Eligible?; Enroll Your Devices; Create Your New Apple ID; Add Your Business Details; Wait Your Turn; The Final Steps; Now You Can Start; Find Your MDM; Add Your MDM to DEP; Step 1: Enter Your MDM Server Name; Step 2: Add the Key; Step 3: Get Your Token; What's Next?; Enroll a Device to Your MDM; Sync with Apple DEP; Setting Up Apps; Deploy Your App Catalog; Add an App; Add App Groups and Deploy; Push Assigned Apps; Manage Your Configurations.
: Change Group SettingsChapter 3: Connect to Your Network Securely; Different Connection Types; Virtual Private Networks (VPNs); Select and Install a VPN App; Manage Your VPN from Your MDM; Add a New VPN Provider; Connect the VPN to Your iPhone; Push Your Wi-Fi Connection; Keep Your Employees Safe and Connected; VPN over Wi-Fi; Using Wi-Fi in Public; How to Protect Your Employees; Ask to Join Networks; Turn Off WPS; Change Your Router Login Information Often; Ensure Legitimacy or Turn Off Wi-Fi; Manage Your 4G Connections; Chapter 4: Creating Policies; Company vs. Personal iPhones.
: Chapter 2: Using Security Apps and BackupTaking Specific Security Actions; Send a Message; Lock the Screen; Clear the Passcode; Wipe Data; Finding Security Apps in the App Store; Backing Up with iCloud and iTunes; Backup to iCloud; Backup to a Computer; Setting Up Supervision Mode; Add Devices to DEP; Add Devices in Apple Configurator; How Do I Buy a Mac?; Add Your iPhone; Set Up the Supervised iPhone; Create a New Group for Supervised iPhones; Assign iPhones to the New Group; Change Group Configurations; Existing Profiles; Links to Add Profiles; Drop-Down Menu Selection; When You're Finished.
: Company iPhonesPersonal iPhones; Privacy; Litigation; Phone Stipends; Provisioning Policies for User Management; Adding Roles in SimpleMDM; Adding a User in SimpleMDM; Setting Advanced User Security Options; Establishing Two-Factor Authentication; Using Single Sign-On; Policies for Loss, Theft, and Damage; Before You Start Shopping; AppleCare and Extended Plans; Insurance; Worth Ave. Group; Esurance; Asurion; Questions to Ask; Chapter 5: Communicating About Security; Communicate Your Policies; Check Your Existing Policies; Creating Policy Documents; Who is My Audience?
: How Much Information Do I Include?What Is the Employee's Responsibility?; How Do Employees Report an Incident?; How Can Employees Give Feedback?; How Do I Ensure Employee Compliance?; Communicating Your Policy; Presentation Needs; Recording Your Presentation; Phishers are Fishing for You; Look for the Hooks; Check and Communicate; Staying Safe Browsing the Web; Private Browsing in Safari; What Private Browsing Won't Block; Block All Cookies; Block or Approve Websites in Supervised Mode; Blacklist Websites; Whitelist a Website; Manage Passwords; Managing App Permissions.
Abstract : Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks. Managing and maintaining iPhones and iPads in a corporate or other business environment inherently requires strict attention to security concerns. Managers and IT professionals need to know how to create and communicate business policies for using iOS devices in the workplace, and implement security and forensics tools to manage and protect them. The iPhone and iPad are both widely used across businesses from Fortune 500 companies down to garage start-ups. All of these devices must have secure and monitorable ways to connect to the internet, store and transmit data without leaks, and even be managed in the event of a physical theft. Pro iOS Security and Forensics covers all these concerns as well as also offering tips for communicating with employees about the policies your business puts in place, why those policies are important, and how to follow them.
Subject : Computer networks-- Security measures.
Subject : iPad (Computer)-- Security measures.
Subject : iPhone (Smartphone)-- Security measures.
Subject : Computer networks-- Security measures.
Subject : COMPUTERS-- Operating Systems-- Apple (Mac OS iOS)
Subject : COMPUTERS-- Security-- General.
Subject : Security systems.
Subject : iOS (Electronic resource)-- Security measures.
: IOS (Electronic resource)
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.774.I67‬
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟