O'Reilly logo

Mobile Application Penetration Testing by Vijay Kumar Velu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. Securing Your Android and iOS Applications

Building Secure Apps is not an option, it is a necessity!

Developing mobile applications is not just developing a vision of what your app is going to look like, what it is going to do, what needs it fulfills, and how it will be created but also how secure it could be made. This chapter will cover straightforward examples on how to securely develop both Android and iOS applications; more importantly, it will also present resources that developers can use in their everyday lives. We will go through practical ways of securing Android component communications, and principles developers can stand by. We will precisely look at how to properly secure an app with fine-tuned permissions and configuration ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required