Kirjojen hintavertailu. Mukana 12 246 258 kirjaa ja 12 kauppaa.

Kirjailija

Dave Poirier

Kirjat ja teokset yhdessä paikassa: 2 kirjaa, julkaisuja vuodelta 2026, suosituimpien joukossa iOS Security Through Defensive Techniques. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

2 kirjaa

AI Driven Swift Architecture

AI Driven Swift Architecture

Walid SASSI; Dave Poirier; Jon Reid

PACKT PUBLISHING LIMITED
2026
nidottu
Build future ready iOS apps with Apple Foundation Models, MCP agents, Claude Code, and AI guided testing to ship code faster Key Features Build SwiftUI apps powered by Apple Foundation Models and on-device intelligence Apply MCP workflows to create AI-driven feature agents in real projects Master Clean Architecture, TDD, and modernization with Claude Code support Book DescriptionAI isn’t replacing engineers, it’s developers collaborating with intelligent tools to build stronger, safer, and more maintainable applications. AI Driven Swift Architecture is your practical guide to help intermediate and senior iOS developers confidently embrace the next era of Apple development. This book takes you on an unfiltered journey into modern Swift development with Swift 6 concurrency, SwiftUI, and Clean Architecture at its core. You’ll learn how Claude Code and advanced AI assistants can accelerate feature development, improve architectural decision-making, and transform testing into a collaborative workflow. You will explore Apple’s new on-device foundation models for private, offline intelligence and put the Model Context Protocol (MCP) into practice by building custom MCP servers in Swift. From AI-powered legacy modernization to governance workflows with Request for Comments and Architecture Decision Record, every chapter focuses on real code, real patterns, and real outcomes. Whether you’re modernizing existing UIKit systems or designing scalable SwiftUI architectures from scratch, this book will offer you a repeatable workflow for shipping future ready iOS apps feature by feature, agent by agent, and test by test. What you will learn Configure Xcode workflows for AI assisted Swift workflows Apply Swift concurrency patterns with AI guided reasoning Design SwiftUI features using Clean Architecture boundaries Learn to use Claude Code to drive TDD, refactors, and code reviews Modernize UIKit codebases with safe, incremental migrations Integrate Apple Foundation Models for private on device AI Build MCP servers in Swift to power feature focused agents Write RFCs and ADRs to govern AI adoption in iOS teams Who this book is forThis book is for intermediate to senior Swift developers who build and maintain iOS apps and want to adopt AI tools without sacrificing quality. If you are responsible for architecture, testing strategy, or modernization roadmaps, you will learn patterns that scale from a single feature to a full team workflow. Familiarity with Swift and Xcode is recommended.
iOS Security Through Defensive Techniques

iOS Security Through Defensive Techniques

Deya Elkhawaldeh; Dave Poirier

PACKT PUBLISHING LIMITED
2026
nidottu
Protect your iOS apps from evolving attacks with a complete, practical toolkit of defensive techniques, cryptographic foundations, and real-world app hardening techniques. Key Features Build a strong iOS security baseline with threat modeling, privacy, and safe data handling. Harden apps against iOS attack paths with validation, tamper resistance, runtime checks and more. Protect sensitive data using correct cryptography, secure storage, and hardware backed keys. Book DescriptionIf you build iOS apps, you also manage risk, from insecure data storage to reverse engineering and runtime tampering. This book treats security as part of the development workflow, not an afterthought, and focuses on practical techniques you can apply without needing deep cryptography or penetration testing expertise. You will start by defining what needs protection: sensitive data, how it is categorized, how long it should be retained, and how privacy expectations and legal requirements shape design decisions. From there, you will study common attack techniques such as network interception, injection, configuration mistakes, URL scheme abuse, code tampering, repackaging, and runtime manipulation. The book then moves into defenses: platform and language safety, code signing and entitlements, secure error and execution handling, data validation, transport security with TLS pinning, and runtime protections against debuggers and emulation. On the data side, you will use Keychain, file protection classes, and Secure Enclave features to protect secrets and keys, and you will evaluate clipboard and backup related risks. Finally, you will build a repeatable security program across the app lifecycle, from static and dynamic analysis to incident response planning and bug bounty triage, so you can ship trustworthy iOS apps at scale. What you will learn Understand core iOS security, privacy, and threat modeling concepts Learn to classify sensitive data and set clear handling and retention rules Apply platform safe coding patterns to reduce common app flaws Protect sensitive data using Keychain, file protection, and hardware backed keys. Implement secure storage using Keychain, file protection, and Secure Enclave Use modern cryptography with correct key management and safe defaults Harden apps with anti-debugging, RASP, and runtime integrity checks Who this book is forThis book is for iOS developers, mobile engineers, and architects who build or maintain production apps. DevSecOps engineers and security consultants supporting mobile pipelines will also benefit. Readers should be comfortable with Swift, Xcode, and the iOS app lifecycle, and have hands-on development experience.