Interprocess Communication with macOS: Apple IPC Methods
Autor Hem Dutten Limba Engleză Paperback – 29 mai 2021
You'll see how IPC techniques are used for exchanging data and messages among multiple threads in one or more processes, which may be running on one or more computers connected by a network or running locally. IPC methods can be divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC). A poorly conceived IPC can even expose an entire network to over-the-network attacks. Despite the risks, processes and applications absolutely need to communicate with each other across your system and the network. You'll see how these communications facilitate information sharing, computational speedup, modularity, convenience, and privilege separation.
In macOS, a program has a number of ways to communicate with other programs. These mechanisms for IPC often exist in different layers of the system. You'll examine how each has its own specific purposes, limitations, and intended scenarios. Some are more suitable than others for code written at a certain level of the system. For example, a kernel extension would not make use of Apple events.
Additionally, the book reveals that different users have different rights when it comes to accessing files, changing system wide settings, and so on, depending on whether they are admin users or ordinary users. Running code with root or administrative privileges can intensify the dangers posed by security vulnerabilities. You'll learn that to elevate privileges safely, it is mandatory for the application to perform the task through a secure Helper process.
What You'll Learn
- Expand the capabilities of your programs by sharing data within multiple applications
- Understand and dig deep into the world of Helper tools to create apps that need user privilege elevation
- Enhance the modularity of a system by allowing your applications to interact and share data with a website
Who This Book Is For
Software engineers and architects designing and developing secure applications for macOS and iOS who have hands-on knowledge of Swift with XCode.
Preț: 285.48 lei
Preț vechi: 356.85 lei
-20% Nou
Puncte Express: 428
Preț estimativ în valută:
54.64€ • 58.75$ • 45.55£
54.64€ • 58.75$ • 45.55£
Carte disponibilă
Livrare economică 28 noiembrie-12 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781484270448
ISBN-10: 1484270444
Pagini: 284
Ilustrații: XVII, 284 p. 73 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.43 kg
Ediția:1st ed.
Editura: Apress
Colecția Apress
Locul publicării:Berkeley, CA, United States
ISBN-10: 1484270444
Pagini: 284
Ilustrații: XVII, 284 p. 73 illus.
Dimensiuni: 155 x 235 mm
Greutate: 0.43 kg
Ediția:1st ed.
Editura: Apress
Colecția Apress
Locul publicării:Berkeley, CA, United States
Cuprins
Chapter 1 : Introduction to IPC on macOS.- Chapter 2 : IPC Through Shared Memory.- Chapter 3 : IPC Through Mach Ports.- Chapter 4 : IPC Through Sockets.- Chapter 5 : IPC Through Apple Events.- Chapter 6 : IPC Through Distributed Notifications.- Chapter 7 : IPC Through Pasteboards.- Chapter 8 : IPC Through XPC.- Chapter 9 : IPC Between a Native App and Web App.- Chapter 10 : Privilege Elevation.
Notă biografică
Hem Dutt started his software engineering career in 2010 as a macOS (OS X) application developer and thereafter designed and developed numerous native macOS and iOS applications for various clients across the globe while working in multiple MNCs. With more than a continuous decade of experience working in macOS, Hem Dutt has developed applications in multiple domains; including healthcare, insurance, VPN clients, publishing, and IOT. His passion for designing and developing secure, reliable, and modular software is evident from his blogs, client awards/recommendations, and open source projects.
Textul de pe ultima copertă
Build highly modular software in macOS that interacts deeply and intuitively with other programs. This book explores all techniques available for Inter-process communications (IPC) from high level macOS layers to deep kernel options while applying theoretical concepts into practical implementations on real world scenarios.
You'll see how IPC techniques are used for exchanging data and messages among multiple threads in one or more processes, which may be running on one or more computers connected by a network or running locally. IPC methods can be divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC). A poorly conceived IPC can even expose an entire network to over-the-network attacks. Despite the risks, processes and applications absolutely need to communicate with each other across your system and the network. You'll see how these communications facilitate information sharing, computational speedup, modularity, convenience, and privilege separation.
In macOS, a program has a number of ways to communicate with other programs. These mechanisms for IPC often exist in different layers of the system. You'll examine how each has its own specific purposes, limitations, and intended scenarios. Some are more suitable than others for code written at a certain level of the system. For example, a kernel extension would not make use of Apple events.
Additionally, the book reveals that different users have different rights when it comes to accessing files, changing system wide settings, and so on, depending on whether they are admin users or ordinary users. Running code with root or administrative privileges can intensify the dangers posed by security vulnerabilities. You'll learn that to elevate privileges safely, it is mandatory for the application to perform the task through a secure Helper process.
You will:
- Expand the capabilities of your programs by sharing data within multiple applications
- Understand and dig deep into the world of Helper tools to create apps that need user privilege elevation
- Enhance the modularity of a system by allowing your applications to interact and share data with a website
Caracteristici
Implement theoretical concepts of IPC to solve real world problems in macOS applications Handle complex privilege elevation problems in secure ways Interact with Agents and Daemons on macOS