A Practical Guide to Networking and Security in iOS 8

NetSec-iOS-8-square.png
NetSec_iOS8_page39.png
NetSec-iOS-8-square.png
NetSec_iOS8_page39.png

A Practical Guide to Networking and Security in iOS 8

15.00

This ebook describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with ease while protecting your data. It also covers Bluetooth networking, tracking an iOS device, using AirDrop and AirPlay, and solving connection problems.

Add To Cart

Networking should be simple, and security should be automatic. And money should grow on trees. Despite how intuitive it is to pick up and use an iOS device, requiring little thought as to how it connects to a cellular or Wi-Fi network, it becomes quite complex as soon as you drill down to any details. This is especially true when connectivity fails, and you try to troubleshoot the problem.

Security is an even denser area. Apple makes the default choices in iOS reasonably secure, but to ensure real protection for your data—while your bits are traveling through the æther or whether your device is stolen—you need to know how it all works.

The book is divided into two major sections, one on networking and one on security, though there is, of course, overlap.

Download is a standard ZIP archive (all platforms) with PDF, EPUB, and MOBI (Kindle compatible) versions of the book. Free updates to this iOS 8 edition are included; see Welcome page for details.

Networking: It’s true that an iOS device can be used without a live network connection, but its natural state is always hooked up. In this first part of the book, you’ll learn how to work with the three types of iOS wireless communication—Wi-Fi, cellular, and Bluetooth—for general connectivity, with personal hotspots, for audio and video streaming, and for file transfer.

Security: Security encompasses many forms: How do you deal with a device being stolen? How do you protect its contents when it’s out of your control? How do you prevent people from snooping on your network sessions? In this half of the book, you’ll get answers that will make you feel better when using a device in all situations.