O'Reilly logo

Mobile Location Services: The Definitive Guide by Andrew Jagoe

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Authentication and Security

Many people think of computer security in terms of secrecy or confidentiality. Equally important to computer security are data integrity, authentication, and systems availability. In mobile location services, it is not only important to keep customer information and commerce transactions confidential, but to keep account records from being corrupted or modified and to make sure that the system is resistant to denial of service attacks. Denial of service attacks can prevent service delivery, and are the most potentially devastating attack a mobile location service application can face. Security breaches damage consumer confidence and brand equity.

When considering security for your mobile location services ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required