Issue No. 03 - May-June (2013 vol. 15)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MITP.2013.46
Jeffery Payne , Coveros
The author reviews how and why threat models differ between mobile applications and traditional Web applications and discusses a few of the best practices associated with secure mobile development.
Mobile communication, Network security, Best practices, Security, mobile computing, mobile applications, application security, information technology, threat models, mobile security
Jeffery Payne, "Secure Mobile Application Development", IT Professional, vol. 15, no. , pp. 6-9, May-June 2013, doi:10.1109/MITP.2013.46