O'Reilly logo

Building Solutions with the Microsoft .NET Compact Framework: Architecture and Best Practices for Mobile Development by Jon Box, Dan Fox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the Application

The second layer to which security should be applied is the application itself. Typically, this security includes the concepts of authentication, data protection, and user input.

Authentication

Throughout this book we've highlighted the various ways that a Compact Framework application can connect to back-end data. The primary mechanisms include the following:

  • Invoking SqlClient directly: This option was discussed in Chapter 4 and involves directly connecting to a remote SQL Server using the SqlClient .NET data provider.

  • SQLCE connectivity: Both RDA and merge replication use the SQLCE connectivity architecture described in Chapter 7.

  • XML Web Services: In Chapter 4 we discussed calling XML Web Services from the Compact ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required