Secure Development for Mobile Apps: How to Design and Code Secure Mobile Applications with PHP and JavaScript
β Scribed by J. D. Glaser
- Publisher
- Auerbach Publications
- Year
- 2014
- Tongue
- English
- Leaves
- 460
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
The world is becoming increasingly mobile. Smartphones and tablets have become more powerful and popular, with many of these devices now containing confidential business, financial, and personal information. This has led to a greater focus on mobile software security.
Establishing mobile software security should be of primary concern to every mobile application developer. This book explains how you can create mobile social applications that incorporate security throughout the development process.
Although there are many books that address security issues, most do not explain how to incorporate security into the building process. Secure Development for Mobile Apps does exactly that. Its step-by-step guidance shows you how to integrate security measures into social apps running on mobile platforms. Youβll learn how to design and code apps with security as part of the process and not an afterthought. The author outlines best practices to help you build better, more secure software.
This book provides a comprehensive guide to techniques for secure development practices. It covers PHP security practices and tools, project layout templates, PHP and PDO, PHP encryption, and guidelines for secure session management, form validation, and file uploading. The book also demonstrates how to develop secure mobile apps using the APIs for Google Maps, YouTube, jQuery Mobile, Twitter, and Facebook. While this is not a beginnerβs guide to programming, you should have no problem following along if youβve spent some time developing with PHP and MySQL.
π SIMILAR VOLUMES
<p>The development of mobile technology has experienced exponential growth in recent years. Mobile devices are ubiquitous in modern society, impacting both our personal and professional lives.</p><p><b>Mobile Application Development, Usability, and Security</b> provides a thorough overview on the di
This book presents initial steps towards creating secure systems that overcome attacks through adaptation. It provides a model explaining mobile code and methods for designing robust peer-to-peer networks. Methods are provided for implementing adaptive systems designed to tolerate many current attac
<p>Keep your data secure on the go</p> <p><b>Overview</b></p> <ul> <li>Learn how mobile devices are monitored and the impact of cloud computing</li> <li>Understand the attacks hackers use and how to prevent them</li> <li>Keep yourself and your loved ones safe online</li> </ul> <p><b>In Detail</b></p
<p>Keep your data secure on the go</p> <p><b>Overview</b></p> <ul> <li>Learn how mobile devices are monitored and the impact of cloud computing</li> <li>Understand the attacks hackers use and how to prevent them</li> <li>Keep yourself and your loved ones safe online</li> </ul> <p><b>In Detail</b></p