The Community for Technology Leaders
Green Image
Issue No. 03 - May-June (2013 vol. 15)
ISSN: 1520-9202
pp: 6-9
Jeffery Payne , Coveros
The author reviews how and why threat models differ between mobile applications and traditional Web applications and discusses a few of the best practices associated with secure mobile development.
Mobile communication, Network security, Best practices, Security, mobile computing, mobile applications, application security, information technology, threat models, mobile security
Jeffery Payne, "Secure Mobile Application Development", IT Professional, vol. 15, no. , pp. 6-9, May-June 2013, doi:10.1109/MITP.2013.46
89 ms
(Ver 3.3 (11022016))