Chapter 9. Security

 

Quandoque bonus dormitat Homerus. Even good Homer nods sometimes. (Even the cleverest can make mistakes.)

 
 --Horace

In this chapter, we describe the vulnerabilities and threats to a mobilized enterprise web architecture. We also describe mobile device security, secure communications between the client and servers, and security on the enterprise web servers and back-end systems.

Mobilized Enterprise Web Architectures

At the enterprise level, a secure architecture is usually required to protect the service provider’s assets from being attacked. Security architectures generally use some form of role-based access control and database-enabled or system-enabled authentication and authorization mechanisms that integrate user identity, ...

Get Mobile Applications: Architecture, Design, and Development now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.