Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Embedded Java Security: Security for Mobile Devices

Buy
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically the case of devices supporting embedded Java) on security. In this regard, the main components of embedded Java are also presented to have an idea about the platform architecture. To assess the effectiveness of security measures, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis and the Common Criteria methodology of security evaluation.

Java Micro Edition (Java ME) (currently version 2, hence J2ME) is the Java platform for resource-limited embedded devices such as Personal Digital Assistants (PDA), cellular phones, TV set-top boxes, automobile navigation systems and a broad range of embedded devices (washing machines, interconnecting electronic toys, etc.). Java ME provides the power and benefits of Java programming language tailored for embedded devices, including mobility of code, security, networking capabilities, etc.

In order to address the specific requirements of different market segments and device families, the high-level Java ME architecture defines 3 layers on top of the device’s operating system, namely, the virtual machine layer, the configuration layer, and the profile layer. The virtual machine is an implementation of the Java Virtual Machine (JVM). The configuration is a minimal set of class libraries that provide the basic functionalities for a particular range of devices. Currently, there are two standard configurations, namely, Connected Device Configuration (CDC) and Connected Limited Device Configuration (CLDC). CLDC is designed for devices with intermittent network connections, limited processors and memory. This category includes: Cellular phones, PDAs, etc. CDC, on the other hand, is designed for devices that have more processing power, memory, and network bandwidth. This category includes: Internet TVs, high-end communicators, automobile navigation systems, etc.
(HTML tags aren't allowed.)

Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development
Test-Driven Java Development - Second Edition: Invoke TDD principles for end-to-end application development

This book will teach the concepts of test driven development in Java so you can build clean, maintainable and robust code

Key Features

  • Explore the most popular TDD tools and frameworks and become more proficient in building applications
  • Create applications with better code...
Uncertainty and Intelligent Information Systems
Uncertainty and Intelligent Information Systems
Intelligent systems are necessary to handle modern computer-based technologies managing information and knowledge. This book discusses the theories required to help provide solutions to difficult problems in the construction of intelligent systems. Particular attention is paid to situations in which the available information and data may be...
Virtualization For Dummies
Virtualization For Dummies

Virtualization has become a “megatrend”—and forgood reason. Implementing virtualization allows for more efficientutilization of network server capacity, simpler storageadministration, reduced energy costs, and better use of corporatecapital. In other words: virtualization helps you save money,energy, and space. Not bad,...


Developing Applications for the Cloud on the Microsoft Windows Azure Platform (Patterns & Practices)
Developing Applications for the Cloud on the Microsoft Windows Azure Platform (Patterns & Practices)

Windows Azure is a highly scalable, robust, and cost-effective solution for the deployment of applications and services—for organizations and enterprises of all sizes, and in all types of markets. My task at Microsoft is to ensure that developers can help these organizations and enterprises to achieve their goals by quickly and easily...

Atlas of Ultrasound-Guided Musculoskeletal Injections (Atlas Series)
Atlas of Ultrasound-Guided Musculoskeletal Injections (Atlas Series)

Clear, concise description of more than 100 US-guided injections in musculoskeletal medicine.

A Doody's Core Title for 2015!

Atlas of Ultrasound-Guided Musculoskeletal Injections includes numerous tips and tricks from the field's most experienced and respected practitioners. This unique and...

Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy