Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Fearless Cross-Platform Development with Delphi

You're reading from   Fearless Cross-Platform Development with Delphi Expand your Delphi skills to build a new generation of Windows, web, mobile, and IoT applications

Arrow left icon
Product type Paperback
Published in Oct 2021
Publisher Packt
ISBN-13 9781800203822
Length 544 pages
Edition 1st Edition
Languages
Arrow right icon
Author (1):
Arrow left icon
David Cornelius David Cornelius
Author Profile Icon David Cornelius
David Cornelius
Arrow right icon
View More author details
Toc

Table of Contents (22) Chapters Close

Preface 1. Section 1: Programming Power
2. Chapter 1: Recent IDE Enhancements FREE CHAPTER 3. Chapter 2: Delphi Project Management 4. Chapter 3: A Modern-Day Language 5. Section 2: Cross-Platform Power
6. Chapter 4: Multiple Platforms, One Code Base 7. Chapter 5: Libraries, Packages, and Components 8. Chapter 6: All About LiveBindings 9. Chapter 7: FireMonkey Styles 10. Chapter 8: Exploring the World of 3D 11. Section 3: Mobile Power
12. Chapter 9: Mobile Data Storage 13. Chapter 10: Cameras, the GPS, and More 14. Chapter 11: Extending Delphi with Bluetooth, IoT, and Raspberry Pi 15. Section 4: Server Power
16. Chapter 12: Console-Based Server Apps and Services 17. Chapter 13: Web Modules for IIS and Apache 18. Chapter 14: Using the RAD Server 19. Chapter 15: Deploying an Application Suite 20. Assessments 21. Other Books You May Enjoy

Securing data

If your app is completely self-contained, meaning no interaction with web services or saving data to a remote server, you might think you don't need to worry about securing it. If it's a simple utility measuring or reporting on some aspect of your device, that may be true, but if there's any personal information at all, your users will want to know that no other app can get at their data and that if their device is stolen or hacked, interpreting whatever is stored should be very difficult at the least.

This is one drawback of using an unsecured database such as SQLite or IBLite—there's no built-in encryption. You can encrypt data before it gets stored, which is a good start, but the table structures are still visible and it's far more troublesome to manually encrypt and decrypt yourself for every data operation. By using IB ToGo on mobile devices and a database such as InterBase 2020 on a server, you'll have full table and column...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime