Mobile Applications Security
Mobile applications enable millions of users to have more fun, be more productive, and interact with their world in more ways than ever before. Mobile architectures run the gamut from simple web-based applications optimized for mobile displays to custom-built handset-specific applications that can interact directly with the mobile operating system. This diversity of architectures presents a huge challenge to ensure that applications meet security requirements, such as confidentiality and integrity. Targeted at beginners in the mobile development space, Scott Matsumoto introduces the basics of mobile applications-deployment, digital rights management, and the cellular network-and then addresses popular security attack vectors that hackers exploit. Scott explores the mobile threat model you must consider when developing mobile business applications. Take back a broad introduction to the mobile space, along with a selection of best-practices and solutions to common mobile application security issues.
Upcoming Events
Apr 27 |
STAREAST Software Testing Conference in Orlando & Online |
Jun 08 |
AI Con USA An Intelligence-Driven Future |
Sep 21 |
STARWEST Software Testing Conference in Anaheim & Online |