Chapter 10. Security Programming for Mobile Applications
In this chapter:
Implementing Good Security 356
Storing Credentials and Other Secrets Securely 360
Encrypting Data 374
Securing Network Connections 386
Perimeter Security: Securing Access to the Device 394
Mobile devices are easily lost or stolen. If a device contains data that is valuable to your business, loss of a mobile device can be a disaster. No one wants a device containing customer information or details of user names and passwords required for authentication to the company's systems to fall into the hands of a competitor or an attacker.
In some code samples in other chapters of this book, database passwords or user credentials are shown ...
Get Microsoft® Mobile Development Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.