3. Authentication

In this chapter we look at how some of the authentication mechanisms have failed and what developers have been using to log in to mobile apps that has been more effective.

Get Bulletproof Android™: Practical Advice for Building Secure Apps now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.