O'Reilly logo

Mobile Security: How to Secure, Privatize, and Recover Your Devices by Mari Heiser, Jaya Nampalli, Joseph Anderson, Darla Nykamp, Tim Speed

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Mobile purchasing and identification methods – who needs credit cards?

Social networking and shopping aren't the only things that have gone mobile. Just as other activities have been modified for the mobile space, so have our identification and payment methods. If a customer is not physically present, but is instead ordering an item through a virtual store accessed by their smartphone, how can they present their ID?

CueCats and QR codes

There was a time when, if someone wanted to purchase something, they might write a check. By the late 1990s, checks had been largely replaced by credit cards for most transactions. In either case, however, a customer would often be asked to provide a form of ID such as a driver's license to verify that the name on ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required