The process of creating and implementing applications that are resistant to tampering and/or compromise.