Secure development for mobile apps: how to design and code secure mobile applications with PHP and JavaScript / J. D. Glaser ; foreword by Jeremiah Grossman.
Publication details: Boca Racton: CRC Press, 2015.Description: xxvii, 444 pagesISBN:- 9781482209037 (paperback : acidfree paper)
- 005.256 Q5
Item type | Current library | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|
Books | Mahatma Gandhi University Library General Stacks | 005.256 Q5 (Browse shelf(Opens below)) | Available | 57538 |
Browsing Mahatma Gandhi University Library shelves, Shelving location: General Stacks Close shelf browser (Hides shelf browser)
005.14 Q5 Software quality assurance, testing and metrics/ | 005.14 Q9 Concise guide to software testing/ | 005.25 Q5 Advanced android application development/ | 005.256 Q5 Secure development for mobile apps: | 005.262 PYT R1 Deep learning with Python: learn best practices of deep learning models with PyTorch/ | 005.265 AND Q2 Sams teach yourself Android application development in 24 hours / | 005.265 IBM PC Q5 IBM PC assembly language and programming/ |
"A Auerboch Book."
Includes index.
Includes bibliographical references and index.
"Preface Amazingly, I grew up in the country and we never locked the doors to our house, or our cars. In school, no one broke into someone else's car or locker. If you put something down, you could pretty much rely on it being there when you got back. Family entered without knocking, and non-family never tried. This is no longer the case. Now, even though my house and car are locked, the virtual windows to my life, as well as a basement door I didn't even know existed, are open and under attack thanks to the internet. Now the situation is reversed. Family needs to knock several times before using the secret handshake thingy, and strangers enter anonymously and unannounced into my whatever. Security is something I wish I could do without. The business of building cool things as fast as possible without regard to consequence of theft is far more interesting. Out of necessity, security became a priority. What follows is some of what I've learned along the way. If any of these bits and bytes end up helping to protect you, then I win. I hope you enjoy the book. "--
There are no comments on this title.