Record:   Prev Next
Author Dutt, Hem, author
Title Interprocess communication with macOS : Apple IPC methods / by Hem Dutt
Imprint Berkeley, CA : Apress : Imprint: Apress, 2021
book jacket
Descript 1 online resource (xvii, 284 pages) : illustrations, digital ; 24 cm
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Note Chapter 1 : Introduction to IPC on macOS -- Chapter 2 : IPC Through Shared Memory -- Chapter 3 : IPC Through Mach Ports -- Chapter 4 : IPC Through Sockets -- Chapter 5 : IPC Through Apple Events -- Chapter 6 : IPC Through Distributed Notifications -- Chapter 7 : IPC Through Pasteboards -- Chapter 8 : IPC Through XPC -- Chapter 9 : IPC Between a Native App and Web App -- Chapter 10 : Privilege Elevation
Build highly modular software in macOS that interacts deeply and intuitively with other programs. This book explores all techniques available for Inter-process communications (IPC) from high level macOS layers to deep kernel options while applying theoretical concepts into practical implementations on real world scenarios. You'll see how IPC techniques are used for exchanging data and messages among multiple threads in one or more processes, which may be running on one or more computers connected by a network or running locally. IPC methods can be divided into methods for message passing, synchronization, shared memory, and remote procedure calls (RPC) A poorly conceived IPC can even expose an entire network to over-the-network attacks. Despite the risks, processes and applications absolutely need to communicate with each other across your system and the network. You'll see how these communications facilitate information sharing, computational speedup, modularity, convenience, and privilege separation. In macOS, a program has a number of ways to communicate with other programs. These mechanisms for IPC often exist in different layers of the system. You'll examine how each has its own specific purposes, limitations, and intended scenarios. Some are more suitable than others for code written at a certain level of the system. For example, a kernel extension would not make use of Apple events. Additionally, the book reveals that different users have different rights when it comes to accessing files, changing system wide settings, and so on, depending on whether they are admin users or ordinary users. Running code with root or administrative privileges can intensify the dangers posed by security vulnerabilities. You'll learn that to elevate privileges safely, it is mandatory for the application to perform the task through a secure Helper process. You will: Expand the capabilities of your programs by sharing data within multiple applications Understand and dig deep into the world of Helper tools to create apps that need user privilege elevation Enhance the modularity of a system by allowing your applications to interact and share data with a website
Host Item Springer Nature eBook
Subject Mac OS
Application software -- Development
Electronic data processing
Apple and iOS
Alt Author SpringerLink (Online service)
Record:   Prev Next