This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and – as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
From the reviews:
"This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems." (D. Grigoras, Computing Reviews, December, 2008)
Whereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects of Java and offers a security evaluation for the Java platform.
After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations.
Topics and features:
· Presents the security model underlying Java ME
· Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities
· Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework
· Discusses the most prominent standards that are relevant for Java ME security
· Reports on areas of common vulnerabilities, and considers specifications and programming mistakes
· Hints and suggestions are provided as ways for hardening security
This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guide for self study in the field.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 29,74 per la spedizione da Regno Unito a U.S.A.
Destinazione, tempi e costiGRATIS per la spedizione in U.S.A.
Destinazione, tempi e costiDa: Romtrade Corp., STERLING HEIGHTS, MI, U.S.A.
Condizione: New. Brand New. Soft Cover International Edition. Different ISBN and Cover Image. Priced lower than the standard editions which is usually intended to make them more affordable for students abroad. The core content of the book is generally the same as the standard edition. The country selling restrictions may be printed on the book but is no problem for the self-use. This Item maybe shipped from US or any other country as we have multiple locations worldwide. Codice articolo ABNR-241778
Quantità: 2 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and - as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices. 260 pp. Englisch. Codice articolo 9781849966238
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats.This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening.This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and -as a larger view- mobile devices security. Codice articolo 9781849966238
Quantità: 1 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. No other book specifically addresses the topic of embedded Java securityComprehensive presentation of embedded Java securityHints and suggestions are provided as ways for hardening securityProf Debbabi is a well-known authority and e. Codice articolo 4288742
Quantità: Più di 20 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. xii + 243. Codice articolo 263066738
Quantità: 4 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. Print on Demand pp. xii + 243 38 Illus. Codice articolo 5862573
Quantità: 4 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. Codice articolo 183066744
Quantità: 4 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 243 pages. 9.21x6.06x0.71 inches. In Stock. Codice articolo __1849966230
Quantità: 1 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 243 pages. 9.21x6.06x0.71 inches. In Stock. Codice articolo zk1849966230
Quantità: 1 disponibili
Da: Mispah books, Redhill, SURRE, Regno Unito
Paperback. Condizione: Like New. Like New. book. Codice articolo ERICA80018499662306
Quantità: 1 disponibili