|
|
|||
|
||||
OverviewJava brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening. This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and –as a larger view- mobile devices security. Full Product DetailsAuthor: Mourad Debbabi , Mohamed Saleh , Chamseddine Talhi , Sami ZhiouaPublisher: Springer London Ltd Imprint: Springer London Ltd Edition: Softcover reprint of hardcover 1st ed. 2007 Dimensions: Width: 15.50cm , Height: 1.40cm , Length: 23.50cm Weight: 0.454kg ISBN: 9781849966238ISBN 10: 1849966230 Pages: 246 Publication Date: 13 October 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsReviewsFrom the reviews: This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems. (D. Grigoras, Computing Reviews, December, 2008) Author InformationTab Content 6Author Website:Countries AvailableAll regions |