The Community for Technology Leaders
Green Image
Issue No. 03 - May-June (2013 vol. 15)
ISSN: 1520-9202
pp: 6-9
Jeffery Payne , Coveros
ABSTRACT
The author reviews how and why threat models differ between mobile applications and traditional Web applications and discusses a few of the best practices associated with secure mobile development.
INDEX TERMS
Mobile communication, Network security, Best practices, Security, mobile computing, mobile applications, application security, information technology, threat models, mobile security
CITATION
Jeffery Payne, "Secure Mobile Application Development", IT Professional, vol. 15, no. , pp. 6-9, May-June 2013, doi:10.1109/MITP.2013.46
102 ms
(Ver )