語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Interprocess Communication with macO...
~
SpringerLink (Online service)
Interprocess Communication with macOS = Apple IPC Methods /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Interprocess Communication with macOS/ by Hem Dutt.
其他題名:
Apple IPC Methods /
作者:
Dutt, Hem.
面頁冊數:
XVII, 284 p. 73 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Apple and iOS. -
電子資源:
https://doi.org/10.1007/978-1-4842-7045-5
ISBN:
9781484270455
Interprocess Communication with macOS = Apple IPC Methods /
Dutt, Hem.
Interprocess Communication with macOS
Apple IPC Methods /[electronic resource] :by Hem Dutt. - 1st ed. 2021. - XVII, 284 p. 73 illus.online resource.
Chapter 1 : Introduction to IPC on macOS -- Chapter 2 : IPC Through Shared Memory -- Chapter 3 : IPC Through Mach Ports -- Chapter 4 : IPC Through Sockets -- Chapter 5 : IPC Through Apple Events -- Chapter 6 : IPC Through Distributed Notifications -- Chapter 7 : IPC Through Pasteboards -- Chapter 8 : IPC Through XPC -- Chapter 9 : IPC Between a Native App and Web App -- Chapter 10 : Privilege Elevation.
Build highly modular software in macOS that interacts deeply and intuitively with other programs. This book explores all techniques available for Inter-process communications (IPC) from high level macOS layers to deep kernel options while applying theoretical concepts into practical implementations on real world scenarios. You'll see how IPC techniques are used for exchanging data and messages among multiple threads in one or more processes, which may be running on one or more computers connected by a network or running locally. IPC methods can be divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC). A poorly conceived IPC can even expose an entire network to over-the-network attacks. Despite the risks, processes and applications absolutely need to communicate with each other across your system and the network. You'll see how these communications facilitate information sharing, computational speedup, modularity, convenience, and privilege separation. In macOS, a program has a number of ways to communicate with other programs. These mechanisms for IPC often exist in different layers of the system. You'll examine how each has its own specific purposes, limitations, and intended scenarios. Some are more suitable than others for code written at a certain level of the system. For example, a kernel extension would not make use of Apple events. Additionally, the book reveals that different users have different rights when it comes to accessing files, changing system wide settings, and so on, depending on whether they are admin users or ordinary users. Running code with root or administrative privileges can intensify the dangers posed by security vulnerabilities. You'll learn that to elevate privileges safely, it is mandatory for the application to perform the task through a secure Helper process. You will: Expand the capabilities of your programs by sharing data within multiple applications Understand and dig deep into the world of Helper tools to create apps that need user privilege elevation Enhance the modularity of a system by allowing your applications to interact and share data with a website.
ISBN: 9781484270455
Standard No.: 10.1007/978-1-4842-7045-5doiSubjects--Topical Terms:
1115030
Apple and iOS.
LC Class. No.: QA76.8.M3
Dewey Class. No.: 004.165
Interprocess Communication with macOS = Apple IPC Methods /
LDR
:03934nam a22004095i 4500
001
1054874
003
DE-He213
005
20210623134935.0
007
cr nn 008mamaa
008
220103s2021 xxu| s |||| 0|eng d
020
$a
9781484270455
$9
978-1-4842-7045-5
024
7
$a
10.1007/978-1-4842-7045-5
$2
doi
035
$a
978-1-4842-7045-5
050
4
$a
QA76.8.M3
050
4
$a
QA76.774.I67
072
7
$a
UMQ
$2
bicssc
072
7
$a
COM051370
$2
bisacsh
072
7
$a
UMQ
$2
thema
072
7
$a
ULH
$2
thema
082
0 4
$a
004.165
$2
23
100
1
$a
Dutt, Hem.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1360009
245
1 0
$a
Interprocess Communication with macOS
$h
[electronic resource] :
$b
Apple IPC Methods /
$c
by Hem Dutt.
250
$a
1st ed. 2021.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2021.
300
$a
XVII, 284 p. 73 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Chapter 1 : Introduction to IPC on macOS -- Chapter 2 : IPC Through Shared Memory -- Chapter 3 : IPC Through Mach Ports -- Chapter 4 : IPC Through Sockets -- Chapter 5 : IPC Through Apple Events -- Chapter 6 : IPC Through Distributed Notifications -- Chapter 7 : IPC Through Pasteboards -- Chapter 8 : IPC Through XPC -- Chapter 9 : IPC Between a Native App and Web App -- Chapter 10 : Privilege Elevation.
520
$a
Build highly modular software in macOS that interacts deeply and intuitively with other programs. This book explores all techniques available for Inter-process communications (IPC) from high level macOS layers to deep kernel options while applying theoretical concepts into practical implementations on real world scenarios. You'll see how IPC techniques are used for exchanging data and messages among multiple threads in one or more processes, which may be running on one or more computers connected by a network or running locally. IPC methods can be divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC). A poorly conceived IPC can even expose an entire network to over-the-network attacks. Despite the risks, processes and applications absolutely need to communicate with each other across your system and the network. You'll see how these communications facilitate information sharing, computational speedup, modularity, convenience, and privilege separation. In macOS, a program has a number of ways to communicate with other programs. These mechanisms for IPC often exist in different layers of the system. You'll examine how each has its own specific purposes, limitations, and intended scenarios. Some are more suitable than others for code written at a certain level of the system. For example, a kernel extension would not make use of Apple events. Additionally, the book reveals that different users have different rights when it comes to accessing files, changing system wide settings, and so on, depending on whether they are admin users or ordinary users. Running code with root or administrative privileges can intensify the dangers posed by security vulnerabilities. You'll learn that to elevate privileges safely, it is mandatory for the application to perform the task through a secure Helper process. You will: Expand the capabilities of your programs by sharing data within multiple applications Understand and dig deep into the world of Helper tools to create apps that need user privilege elevation Enhance the modularity of a system by allowing your applications to interact and share data with a website.
650
1 4
$a
Apple and iOS.
$3
1115030
650
0
$a
Apple computer.
$3
909025
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484270448
776
0 8
$i
Printed edition:
$z
9781484270462
856
4 0
$u
https://doi.org/10.1007/978-1-4842-7045-5
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入