Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
897 results found. Sorted by relevance | date | title .
E-Books/E-Docs
Author Butow, Eric, author.

Title Pro iOS security and forensics : enterprise iPhone and iPad safety / Eric Butow.

Imprint New York, NY : Apress, [2018]

Copies

Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file.
Note Includes index.
Summary Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks. Managing and maintaining iPhones and iPads in a corporate or other business environment inherently requires strict attention to security concerns. Managers and IT professionals need to know how to create and communicate business policies for using iOS devices in the workplace, and implement security and forensics tools to manage and protect them. The iPhone and iPad are both widely used across businesses from Fortune 500 companies down to garage start-ups. All of these devices must have secure and monitorable ways to connect to the internet, store and transmit data without leaks, and even be managed in the event of a physical theft. Pro iOS Security and Forensics covers all these concerns as well as also offering tips for communicating with employees about the policies your business puts in place, why those policies are important, and how to follow them.
Note Online resource; title from PDF title page (EBSCO, viewed August 8, 2018).
Contents Intro; Table of Contents; About the Author; Acknowledgments; Chapter 1: Preparing Security Features; What iPhones Are Eligible?; Enroll Your Devices; Create Your New Apple ID; Add Your Business Details; Wait Your Turn; The Final Steps; Now You Can Start; Find Your MDM; Add Your MDM to DEP; Step 1: Enter Your MDM Server Name; Step 2: Add the Key; Step 3: Get Your Token; What's Next?; Enroll a Device to Your MDM; Sync with Apple DEP; Setting Up Apps; Deploy Your App Catalog; Add an App; Add App Groups and Deploy; Push Assigned Apps; Manage Your Configurations.
Chapter 2: Using Security Apps and BackupTaking Specific Security Actions; Send a Message; Lock the Screen; Clear the Passcode; Wipe Data; Finding Security Apps in the App Store; Backing Up with iCloud and iTunes; Backup to iCloud; Backup to a Computer; Setting Up Supervision Mode; Add Devices to DEP; Add Devices in Apple Configurator; How Do I Buy a Mac?; Add Your iPhone; Set Up the Supervised iPhone; Create a New Group for Supervised iPhones; Assign iPhones to the New Group; Change Group Configurations; Existing Profiles; Links to Add Profiles; Drop-Down Menu Selection; When You're Finished.
Change Group SettingsChapter 3: Connect to Your Network Securely; Different Connection Types; Virtual Private Networks (VPNs); Select and Install a VPN App; Manage Your VPN from Your MDM; Add a New VPN Provider; Connect the VPN to Your iPhone; Push Your Wi-Fi Connection; Keep Your Employees Safe and Connected; VPN over Wi-Fi; Using Wi-Fi in Public; How to Protect Your Employees; Ask to Join Networks; Turn Off WPS; Change Your Router Login Information Often; Ensure Legitimacy or Turn Off Wi-Fi; Manage Your 4G Connections; Chapter 4: Creating Policies; Company vs. Personal iPhones.
Company iPhonesPersonal iPhones; Privacy; Litigation; Phone Stipends; Provisioning Policies for User Management; Adding Roles in SimpleMDM; Adding a User in SimpleMDM; Setting Advanced User Security Options; Establishing Two-Factor Authentication; Using Single Sign-On; Policies for Loss, Theft, and Damage; Before You Start Shopping; AppleCare and Extended Plans; Insurance; Worth Ave. Group; Esurance; Asurion; Questions to Ask; Chapter 5: Communicating About Security; Communicate Your Policies; Check Your Existing Policies; Creating Policy Documents; Who is My Audience?
How Much Information Do I Include?What Is the Employee's Responsibility?; How Do Employees Report an Incident?; How Can Employees Give Feedback?; How Do I Ensure Employee Compliance?; Communicating Your Policy; Presentation Needs; Recording Your Presentation; Phishers are Fishing for You; Look for the Hooks; Check and Communicate; Staying Safe Browsing the Web; Private Browsing in Safari; What Private Browsing Won't Block; Block All Cookies; Block or Approve Websites in Supervised Mode; Blacklist Websites; Whitelist a Website; Manage Passwords; Managing App Permissions.
Note Copyright 2018 Eric Butow. 2018.
Copyright 2018 Eric Butow. 2018.
Subject iOS (Electronic resource) -- Security measures.
IOS (Electronic resource) (OCoLC)fst01784820
iPhone (Smartphone) -- Security measures.
iPad (Computer) -- Security measures.
Computer networks -- Security measures.
COMPUTERS -- Operating Systems -- Apple (Mac OS & iOS)
COMPUTERS -- Security -- General.
Computer networks -- Security measures. (OCoLC)fst00872341
Security systems. (OCoLC)fst01110883
Genre/Form Electronic books.
Other Form: Print version: 1484237560 9781484237564 (OCoLC)1035510865
ISBN 9781484237571 (electronic bk.)
1484237579 (electronic bk.)
9781484237564
1484237560
Standard No. 9781484237564
9781484237571
10.1007/978-1-4842-3757-1 doi
AU@ 000063892930

 
    
Available items only