kevinfielder.co.uk
Secure Mobile Applications, part 2
My last post covered some of the benefits of getting to a point where a mobile application can be considered ‘secure enough’ to replace dedicated hardware solutions, including the requi…