Hacking and Securing IOS Applications

Stealing Data, Hijacking Software, and How to Prevent It

Explores hacking the iPhone and iPad; provides practical information on specific security threats; and presents a discussion of code level countermeasures for implementing security.

You've now compiled, signed, and executed your first command-line application
for iOS. In the next section, you'll learn how to run this code remotely. While you'
re still logged into the device, move the hello program into the /usr/bin directory: ...