Limit this search to....

Embedded Java Security: Security for Mobile Devices 2007 Edition
Contributor(s): Debbabi, Mourad (Author), Saleh, Mohamed (Author), Talhi, Chamseddine (Author)
ISBN: 1846285909     ISBN-13: 9781846285905
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Hardcover - Other Formats
Published: December 2006
Qty:
Annotation: Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats.

This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening.

This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and as a larger view- mobile devices security.

Additional Information
BISAC Categories:
- Computers | Networking - General
- Computers | Software Development & Engineering - General
- Computers | Computer Science
Dewey: 005.8
LCCN: 2006931788
Physical Information: 0.7" H x 6.43" W x 9.39" (1.09 lbs) 246 pages
 
Descriptions, Reviews, Etc.
Publisher Description:

This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and - as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices.