In this chapter:
Encrypting Data 374
Mobile devices are easily lost or stolen. If a device contains data that is valuable to your business, loss of a mobile device can be a disaster. No one wants a device containing customer information or details of user names and passwords required for authentication to the company's systems to fall into the hands of a competitor or an attacker.
In some code samples in other chapters of this book, database passwords or user credentials are shown ...