Security for Hybrid Mobile Development: Challenges and Opportunities

Security for Hybrid Mobile Development: Challenges and Opportunities

ISBN13: 9781522520139|ISBN10: 1522520139|EISBN13: 9781522520146
DOI: 10.4018/978-1-5225-2013-9.ch011
Cite Chapter Cite Chapter

MLA

Tanque, Marcus. "Security for Hybrid Mobile Development: Challenges and Opportunities." Advancing Cloud Database Systems and Capacity Planning With Dynamic Applications, edited by Narendra Kumar Kamila, IGI Global, 2017, pp. 246-288. https://doi.org/10.4018/978-1-5225-2013-9.ch011

APA

Tanque, M. (2017). Security for Hybrid Mobile Development: Challenges and Opportunities. In N. Kamila (Ed.), Advancing Cloud Database Systems and Capacity Planning With Dynamic Applications (pp. 246-288). IGI Global. https://doi.org/10.4018/978-1-5225-2013-9.ch011

Chicago

Tanque, Marcus. "Security for Hybrid Mobile Development: Challenges and Opportunities." In Advancing Cloud Database Systems and Capacity Planning With Dynamic Applications, edited by Narendra Kumar Kamila, 246-288. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-2013-9.ch011

Export Reference

Mendeley
Favorite

Abstract

In recent decades, vendors developed technology infrastructure solutions to integrate with enterprises and consumers' mobile devices. Hybrid development platforms are solution architecture designed to enhance developers' capabilities and provide organizations as well as customers the level of services to support mobile devices capabilities. Hybrid development platform solutions are easy to deploy at various enterprises. These capabilities can be distributed to/or integrated with mobile devices as agile applications and system interfaces. Hybrid mobile devices are designed to further provide users with enhanced technology solutions: cloud computing, big data, the Internet, physical and/or virtual network systems. The development of hybrid mobile platforms provides developers with advanced technology capabilities, necessary for supporting mobile devices once deployed to the marketplace. Technical and security features affecting the development and security of mobile devices are also discussed in this chapter.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.