Securing third-party code and components

As with all software, mobile applications heavily use third-party libraries and wrappers to perform a function such as making HTTP requests or encrypting objects. These libraries can also introduce weaknesses into an application and expose confidential information or affect the integrity of the application itself. With this in mind, third-party code should be reviewed for vulnerabilities, updated, and tested where applicable. This is especially true for hybrid applications that depend on third-party hybrid frameworks and libraries to send, receive, and save data. This recipe will discuss methods to ensure third-party code does not introduce vulnerabilities into IoT applications.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.37.10