Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book is a comprehensive presentation of embedded Java security. No other book specifically addresses the topic of embedded Java security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening. This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and – as a larger view - mobile devices security.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and - as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices.
This book is a comprehensive presentation of embedded Java security. No other book specifically addresses the topic of embedded Java security. The main components of embedded Java are also generally presented to give an idea about the platform architecture.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. No other book specifically addresses the topic of embedded Java security. Furthermore, the book provides hints and suggestions as ways for hardening security, and offers researchers and practitioners alike a broader and deeper understanding of the issues involved in embedded Java security, and - as a larger view - mobile devices security. The author is a well-known authority and expert in mobile computing and embedded devices. 260 pp. Englisch. N° de réf. du vendeur 9781849966238
Quantité disponible : 2 disponible(s)
Vendeur : Books Puddle, New York, NY, Etats-Unis
Etat : New. pp. xii + 243. N° de réf. du vendeur 263066738
Quantité disponible : 4 disponible(s)
Vendeur : moluna, Greven, Allemagne
Etat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. No other book specifically addresses the topic of embedded Java securityComprehensive presentation of embedded Java securityHints and suggestions are provided as ways for hardening securityProf Debbabi is a well-known authority and e. N° de réf. du vendeur 4288742
Quantité disponible : Plus de 20 disponibles
Vendeur : Majestic Books, Hounslow, Royaume-Uni
Etat : New. Print on Demand pp. xii + 243 38 Illus. N° de réf. du vendeur 5862573
Quantité disponible : 4 disponible(s)
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
Etat : New. PRINT ON DEMAND pp. xii + 243. N° de réf. du vendeur 183066744
Quantité disponible : 4 disponible(s)
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
Taschenbuch. Etat : Neu. This item is printed on demand - Print on Demand Titel. Neuware -Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats.This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening.This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and ¿as a larger view- mobile devices security.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 260 pp. Englisch. N° de réf. du vendeur 9781849966238
Quantité disponible : 1 disponible(s)
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. Embedded Java Security | Security for Mobile Devices | Mourad Debbabi (u. a.) | Taschenbuch | xiv | Englisch | 2010 | Springer | EAN 9781849966238 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu. N° de réf. du vendeur 107145520
Quantité disponible : 5 disponible(s)
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
Taschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats.This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening.This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and -as a larger view- mobile devices security. N° de réf. du vendeur 9781849966238
Quantité disponible : 1 disponible(s)
Vendeur : Revaluation Books, Exeter, Royaume-Uni
Paperback. Etat : Brand New. 243 pages. 9.21x6.06x0.71 inches. In Stock. N° de réf. du vendeur zk1849966230
Quantité disponible : 1 disponible(s)
Vendeur : Mispah books, Redhill, SURRE, Royaume-Uni
Paperback. Etat : Like New. LIKE NEW. SHIPS FROM MULTIPLE LOCATIONS. book. N° de réf. du vendeur ERICA80018499662306
Quantité disponible : 1 disponible(s)