Abstract
Few topics trip up BlackBerry developers more than the RIM security model. It can be extremely frustrating to take an app that works perfectly in the simulator and find that it won’t even start on a handset; or, worse, one that passes all your internal testing, but exhibits strange behavior in the field. Such problems are often the result of occasionally arcane security rules. Some of them you can bend, some you can break, and others you must live with: in all cases, though, just understanding them will allow you to make better decisions. This chapter examines the most important features of BlackBerry device security and how they affect your applications.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2009 Chris King
About this chapter
Cite this chapter
King, C. (2009). RIM security. In: Advanced BlackBerry Development. Apress. https://doi.org/10.1007/978-1-4302-2657-4_9
Download citation
DOI: https://doi.org/10.1007/978-1-4302-2657-4_9
Publisher Name: Apress
Print ISBN: 978-1-4302-2656-7
Online ISBN: 978-1-4302-2657-4
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)