O'Reilly logo

Microsoft® Mobile Development Handbook by Peter Foot, Daniel Moth, Andy Wigley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Security Programming for Mobile Applications

In this chapter:

Implementing Good Security 356

Storing Credentials and Other Secrets Securely 360

Encrypting Data 374

Securing Network Connections 386

Validating User Input 392

Perimeter Security: Securing Access to the Device 394

Signing Applications 397

Mobile devices are easily lost or stolen. If a device contains data that is valuable to your business, loss of a mobile device can be a disaster. No one wants a device containing customer information or details of user names and passwords required for authentication to the company's systems to fall into the hands of a competitor or an attacker.

In some code samples in other chapters of this book, database passwords or user credentials are shown ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required