Towards usable interfaces for proof based access rights on mobile devices
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Hi-index | 0.00 |
Expert techniques for securing mobile devices and applications This is the only book on the market that shows IT and Web professionals how to secure mobile devices and the new Web 2.0 applications that run on them. You will learn best practices for securing applications that are written for the most popular mobile platforms, such as Apple iPhone, Windows Mobile, and Google Android. The author provides global case studies based on his work building mobile applications for major international corporate clients.