Book Image

Learning iOS Security

Book Image

Learning iOS Security

Overview of this book

Table of Contents (13 chapters)

Summary


We did a lot in this chapter, which is great. In Chapter 1, iOS Security Overview, we looked at configuring passcodes, and in Chapter 2, Introducing App Security, we looked at app data. Here, we managed both with very basic policies, deployed by inexpensive and easy-to-use MDMs. You can get a lot of complicated functionalities with your MDM, if you choose. You can also do much more with the tools we provided in this chapter, so we hope you will explore everything these tools (and the other third-party MDM suites) have to offer.

In the next chapter, we'll conclude the book by turning our attention to the insides of the device, diving into debugging tools so you can dive even deeper into the abyss, that is, reverse engineering how these things work.