Embedded Java Security: Security for Mobile Devices and over one million other books are available for Amazon Kindle. Learn more

Vous voulez voir cette page en français ? Cliquez ici.


or
Sign in to turn on 1-Click ordering.
More Buying Choices
Have one to sell? Sell yours here
Start reading Embedded Java Security: Security for Mobile Devices on your Kindle in under a minute.

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Embedded Java Security: Security for Mobile Devices [Paperback]

Mourad Debbabi , Mohamed Saleh , Chamseddine Talhi , Sami Zhioua

List Price: CDN$ 101.13
Price: CDN$ 77.02 & FREE Shipping. Details
You Save: CDN$ 24.11 (24%)
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Usually ships within 2 to 4 weeks.
Ships from and sold by Amazon.ca. Gift-wrap available.

Formats

Amazon Price New from Used from
Kindle Edition CDN $60.44  
Paperback CDN $63.62  
Paperback, Dec 18 2006 CDN $77.02  

Book Description

Dec 18 2006 1846285909 978-1846285905 2007

This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and – as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices.


Product Details


Product Description

Review

From the reviews:

"This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems." (D. Grigoras, Computing Reviews, December, 2008)

From the Back Cover

Whereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects of Java and offers a security evaluation for the Java platform.

After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations.

Topics and features:

• Presents the security model underlying Java ME

• Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities

• Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework

• Discusses the most prominent standards that are relevant for Java ME security

• Reports on areas of common vulnerabilities, and considers specifications and programming mistakes

• Hints and suggestions are provided as ways for hardening security

This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guide for self study in the field.


Inside This Book (Learn More)
Explore More
Concordance
Browse Sample Pages
Front Cover | Copyright | Table of Contents | Excerpt | Index
Search inside this book:

Customer Reviews

There are no customer reviews yet.
5 star
4 star
3 star
2 star
1 star
ARRAY(0xa4afe420)

Look for similar items by category


Feedback