Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book is a comprehensive presentation of embedded Java security. No other book specifically addresses the topic of embedded Java security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening. This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and - as a larger view - mobile devices security.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and - as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 7,68 expédition depuis Etats-Unis vers France
Destinations, frais et délaisGratuit expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : Romtrade Corp., STERLING HEIGHTS, MI, Etats-Unis
Etat : New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide. N° de réf. du vendeur ABNR-85123
Quantité disponible : 1 disponible(s)
Vendeur : Basi6 International, Irving, TX, Etats-Unis
Etat : Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. N° de réf. du vendeur ABEJUNE24-242324
Quantité disponible : 1 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. No other book specifically addresses the topic of embedded Java securityComprehensive presentation of embedded Java securityHints and suggestions are provided as ways for hardening securityProf Debbabi is a well-known authority and e. N° de réf. du vendeur 4283007
Quantité disponible : Plus de 20 disponibles
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : Used. pp. 260. N° de réf. du vendeur 26299670
Quantité disponible : 1 disponible(s)
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : Used. pp. 260 Illus. N° de réf. du vendeur 7548233
Quantité disponible : 1 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : Used. pp. 260. N° de réf. du vendeur 18299676
Quantité disponible : 1 disponible(s)
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Buch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and - as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices. 260 pp. Englisch. N° de réf. du vendeur 9781846285905
Quantité disponible : 2 disponible(s)
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9781846285905_new
Quantité disponible : Plus de 20 disponibles
Vendeur : Chiron Media, Wallingford, Royaume-Uni
Paperback. Etat : New. N° de réf. du vendeur 6666-IUK-9781846285905
Quantité disponible : 10 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Buch. Etat : Neu. Neuware -Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats.This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening.This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and ¿as a larger view- mobile devices security.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 260 pp. Englisch. N° de réf. du vendeur 9781846285905
Quantité disponible : 2 disponible(s)