Chapter 9. Security
Quandoque bonus dormitat Homerus. Even good Homer nods sometimes. (Even the cleverest can make mistakes.) | ||
--Horace |
In this chapter, we describe the vulnerabilities and threats to a mobilized enterprise web architecture. We also describe mobile device security, secure communications between the client and servers, and security on the enterprise web servers and back-end systems.
Mobilized Enterprise Web Architectures
At the enterprise level, a secure architecture is usually required to protect the service provider’s assets from being attacked. Security architectures generally use some form of role-based access control and database-enabled or system-enabled authentication and authorization mechanisms that integrate user identity, ...
Get Mobile Applications: Architecture, Design, and Development now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.