Abstract

Few topics trip up BlackBerry developers more than the RIM security model. It can be extremely frustrating to take an app that works perfectly in the simulator and find that it won’t even start on a handset; or, worse, one that passes all your internal testing, but exhibits strange behavior in the field. Such problems are often the result of occasionally arcane security rules. Some of them you can bend, some you can break, and others you must live with: in all cases, though, just understanding them will allow you to make better decisions. This chapter examines the most important features of BlackBerry device security and how they affect your applications.

Keywords

Editing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Chris King 2009

Authors and Affiliations

  • Chris King

There are no affiliations available

Personalised recommendations