Text OnlySkip Navigation
The Coverimage
bySheran Gunasekera
Apress 2012 (236 pages) Citation

Including a detailed examination of areas where attacks on applications can take place, this in-depth book will provide developers with the information they need to design useful, high-performing, and secure apps that expose end-users to as little risk as possible.