Symbian3/SDK/Source/GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651.dita
changeset 2 ebc84c812384
parent 0 89d6a7a84779
--- a/Symbian3/SDK/Source/GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651.dita	Fri Jan 22 18:26:19 2010 +0000
+++ b/Symbian3/SDK/Source/GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651.dita	Thu Mar 11 15:24:26 2010 +0000
@@ -9,16 +9,16 @@
 -->
 <!DOCTYPE concept
   PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd">
-<concept id="GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651" xml:lang="en"><title>Application security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
-<p>Native C++ applications have broad access to the mobile device functionality. They can access, for example, network and mobile device interfaces, storage memory and messaging framework. This provides many features for application developers to use, but can be exploited in the wrong hands.</p>
-<p>The Symbian OS v9 <xref href="jar:GUID-35228542-8C95-4849-A73F-2B4F082F0C44.jar!/sdk/doc_source/guide/platsecsdk/index.html" format="application/java-archive">platform security</xref> architecture allows an application server to determine whether installed software using the server can be trusted. This section covers the most critical components in the security system, the components that first encounter problems and form the front line of defense when a system is attacked.</p>
+<concept id="GUID-EEC50FC0-46D5-4ED7-AD95-67430D5EC651" xml:lang="en"><title>Application
+security</title><prolog><metadata><keywords/></metadata></prolog><conbody>
+<p>Native C++ applications have broad access to the mobile device functionality.
+They can access, for example, network and mobile device interfaces, storage
+memory and messaging framework. This provides many features for application
+developers to use, but can be exploited in the wrong hands.</p>
+<p>The Symbian <xref href="GUID-4BFEDD79-9502-526A-BA7B-97550A6F0601.dita">platform
+security</xref> architecture allows an application server to determine whether
+installed software using the server can be trusted. This section covers the
+most critical components in the security system, the components that first
+encounter problems and form the front line of defense when a system is attacked.</p>
 <p>The following aspects of application security are covered in this section:</p>
-<ul>
-<li><p><xref href="GUID-50BE8F1A-513A-433C-B045-66658FC226D7.dita">Client/server communication</xref></p></li>
-<li><p><xref href="GUID-C23196E8-FDD3-4A10-9DA2-DA83A2AD49D9.dita">Applications with an user interface</xref></p></li>
-<li><p><xref href="GUID-2E986A81-F094-4F1D-9ECB-6A325CFA5BB4.dita">Plug-ins</xref></p></li>
-<li><p><xref href="GUID-1293DE8C-E803-4ADF-9FA8-862519337331.dita">Software installer</xref></p></li>
-<li><p><xref href="GUID-8255A186-C1AC-44DA-844C-1FEA029C73BC.dita">Publish and Subscribe</xref></p></li>
-<li><p><xref href="GUID-261ADCEC-C8C8-46E3-A7DC-804AC868C233.dita">Descriptors</xref></p></li>
-</ul>
 </conbody></concept>
\ No newline at end of file