Chapter 15
Mobile Devices and Application Security
After discussing everything in detail about databases and applications, it’s now time to consider mobile devices and security. A mobile device can be a smart phone, a tablet, a gadget in the car, or anything similar. These devices interact with back-end security, back-end databases, wireless networks, memory on the device itself, the front-end interface, programming languages, ever-changing frameworks, and more. As we look through these, mobile application security poses an enhanced threat that is beyond databases and applications. When we design the mobile applications, we need to have three-pronged security: one for databases, one for applications, and one for the mobile device itself.
The ...
Get Database and Application Security: A Practitioner's Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.