A guide to various aspects of protecting iPhone security. It shows security professionals exactly how to defend against 'bad' applications as well as new attacks. It outlines the techniques hackers use to attack the device. It provides an analysis of the iPhone's built-in security, security testing, enterprise iPhone deployment, & forensics.