Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (8): 64-66    DOI:
Current Issue | Archive | Adv Search |
Study on the Enterprise Mobile Application Security Scheme
Zhong Gengfang
Shandong Tobacco Industry Co., Ltd.
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In today's society, market competition is increasingly fierce, while the enterprise management is increasingly sophisticated. As one of the important means of improving the efficiency of enterprises, enterprise mobile applications develop rapidly. However, mobile application security problems in the entire IT industry are not paid enough attention to. This paper mainly discusses on the security scheme of enterprise mobile applications, and uses some technical means to improve the security of enterprise mobile applications.
Key wordsmobile application      information security     
Published: 08 November 2017
:  TN929.5  

Cite this article:

Zhong Gengfang. Study on the Enterprise Mobile Application Security Scheme. Computer & Telecommunication, 2015, 1(8): 64-66.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I8/64

[1] SHAO Ze-jun  DAI Bing  HU You-ming  YIN Jun-han  LIU Yue-chao. Research on the Autonomous and Controllable Maturity of Provincial Enterprise Data Centers: Take Shandong Province for Example[J]. 电脑与电信, 2024, 1(5): 103-.
[2] ZHU Dong-ling ZHOU Xiu-ying.
The Application of Achievement Degree Evaluation
in the Mobile Application Development Course
[J]. 电脑与电信, 2023, 1(1-2): 0-4.
[3] YANG Ye. Research on the Information Security and Management Major Personnel Training Based on“1+X”Certificate System[J]. 电脑与电信, 2021, 1(6): 6-8.
[4] KUANG Hui. Research on Information Security of Computer Network in 5G Communication Era[J]. 电脑与电信, 2020, 1(8): 33-.
[5] ZHANG Mei-xia. Research on the Mechanism of Multi-micro Integration of Museum Construction and Museum Learning — — Taking the Museum of Modern Education Technology as an Example[J]. 电脑与电信, 2019, 1(12): 4-7.
[6] CHEN Rong-zheng. Teaching Reform and Practice of Integration in Mobile Application Development Courses under“Internet Plus”[J]. 电脑与电信, 2018, 1(3): 10-12.
[7] ZHANG Shi-jun. Research on the EarlyWarning and Control System of Information Security Incident Based onWebsite[J]. 电脑与电信, 2017, 1(12): 50-52.
[8] Zhao Xiaomeng, Zhou Junjie. Management System of Mobile Payment Based on Short-range Visible Light Communication[J]. 电脑与电信, 2017, 1(10): 10-13.
[9] Bai Yu. Analysis on Network Security and Information Encryption Technology[J]. 电脑与电信, 2016, 1(8): 53-54.
[10] Xu Haidong. Research and Suggestion on Data Privacy Protection in Cloud Computing[J]. 电脑与电信, 2016, 1(8): 112-113.
[11] Lai Jinzhi. Research on Information Security Protection System of Campus Network in Higher Vocational Colleges[J]. 电脑与电信, 2016, 1(7): 65-67.
[12] Chen Zhangrong. Research on the Computer Information Security Technology and Its Protection[J]. 电脑与电信, 2016, 1(7): 68-70.
[13] Yu Xiangqian. Research on the Tertiary Hospital Informatization Level Protection Plan[J]. 电脑与电信, 2016, 1(6): 65-66.
[14] Zhang Tao, Yin Mengjia, Chen Xiaowen. Design and Research on Information Security Course Experiment Teaching[J]. 电脑与电信, 2015, 1(5): 19-21.
[15] Li Yingjie. The Application of VPN Technology in Computer Network Information Security[J]. 电脑与电信, 2015, 1(5): 27-28.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd