Chapter 10. Security Programming for Mobile Applications

In this chapter:

Implementing Good Security 356

Storing Credentials and Other Secrets Securely 360

Encrypting Data 374

Securing Network Connections 386

Validating User Input 392

Perimeter Security: Securing Access to the Device 394

Signing Applications 397

Mobile devices are easily lost or stolen. If a device contains data that is valuable to your business, loss of a mobile device can be a disaster. No one wants a device containing customer information or details of user names and passwords required for authentication to the company's systems to fall into the hands of a competitor or an attacker.

In some code samples in other chapters of this book, database passwords or user credentials are shown ...

Get Microsoft® Mobile Development Handbook now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.