Feeds
80%
Canon PowerShot S100 compact camera

Canon PowerShot S100 GPS compact camera

The pocket professional

  • alert
  • submit to reddit

Top three mobile application threats

Sample Shots

Canon PowerShot S100 compact camera

Aperture priority f2
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Aperture priority f5
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Auto mode
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Auto mode
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Handheld
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Long exposure - Night
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Long exposure - Day
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Program mode
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Program mode
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Shutter priority
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Shutter priority - ISO 640
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Shutter priority - ISO 80
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Shutter priority - ISO 800
Click for a full-resolution crop

Canon PowerShot S100 compact camera

Click for a full-resolution crop

Seven Steps to Software Security

Next page: Night vision

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.