Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Fearless Cross-Platform Development with Delphi

You're reading from   Fearless Cross-Platform Development with Delphi Expand your Delphi skills to build a new generation of Windows, web, mobile, and IoT applications

Arrow left icon
Product type Paperback
Published in Oct 2021
Publisher Packt
ISBN-13 9781800203822
Length 544 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
David Cornelius David Cornelius
Author Profile Icon David Cornelius
David Cornelius
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Section 1: Programming Power
2. Chapter 1: Recent IDE Enhancements FREE CHAPTER 3. Chapter 2: Delphi Project Management 4. Chapter 3: A Modern-Day Language 5. Section 2: Cross-Platform Power
6. Chapter 4: Multiple Platforms, One Code Base 7. Chapter 5: Libraries, Packages, and Components 8. Chapter 6: All About LiveBindings 9. Chapter 7: FireMonkey Styles 10. Chapter 8: Exploring the World of 3D 11. Section 3: Mobile Power
12. Chapter 9: Mobile Data Storage 13. Chapter 10: Cameras, the GPS, and More 14. Chapter 11: Extending Delphi with Bluetooth, IoT, and Raspberry Pi 15. Section 4: Server Power
16. Chapter 12: Console-Based Server Apps and Services 17. Chapter 13: Web Modules for IIS and Apache 18. Chapter 14: Using the RAD Server 19. Chapter 15: Deploying an Application Suite 20. Assessments 21. Other Books You May Enjoy

Getting permission

One of the first things you'll encounter when trying to use mobile services is that some require express permissions to be granted by the user before allowing your app to access them. That's a good thing—a person's tablet or phone is often a huge collection of personal information. Things such as photos, addresses, emails, passwords, and your current location are not the kind of data that should just be blindly accessed by anyone or any app. Users should be in charge of who gets access to which information.

It used to be that when a new app was being installed, apps would ask the user to confirm all the possible permissions the app would need in order to be installed. These days, the apps are installed, and if and when they need to do something sensitive, that permission is requested and either denied, preventing access for that feature, or approved, allowing the app to proceed. This second method gives the user a more fine-grained control...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime