This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Secure Mobile Application Development
May-June 2013 (vol. 15 no. 3)
pp. 6-9
Jeffery Payne, Coveros
The author reviews how and why threat models differ between mobile applications and traditional Web applications and discusses a few of the best practices associated with secure mobile development.
Index Terms:
Mobile communication,Network security,Best practices,Security,mobile computing,mobile applications,application security,information technology,threat models,mobile security
Citation:
Jeffery Payne, "Secure Mobile Application Development," IT Professional, vol. 15, no. 3, pp. 6-9, May-June 2013, doi:10.1109/MITP.2013.46
Usage of this product signifies your acceptance of the Terms of Use.