Apress Windows 10 Release Sale

Embedded Java Security

Security for Mobile Devices

By Mourad Debbabi , Mohamed Saleh , Chamseddine Talhi , Sami Zhioua

  • eBook Price: $69.99
Buy eBook Buy Print Book

Embedded Java Security Cover Image

This book is a comprehensive presentation of embedded Java security. No other book specifically addresses the topic of embedded Java security. The main components of embedded Java are also generally presented to give an idea about the platform architecture.

Full Description

  • Add to Wishlist
  • ISBN13: 978-1-8462-8590-5
  • 260 Pages
  • User Level: Science
  • Publication Date: March 20, 2007
  • Available eBook Formats: PDF

Related Titles

  • Information Systems and Neuroscience
  • BPM - Driving Innovation in a Digital World
  • Data-Driven Process Discovery and Analysis
  • Physical Asset Management
  • Transactions on Large-Scale Data- and Knowledge-Centered Systems XVIII
  • UML @ Classroom
  • AIDA-CMK: Multi-Algorithm Optimization Kernel Applied to Analog IC Sizing
  • Computational Color Imaging
  • Uncertainty Quantification in Computational Fluid Dynamics and Aircraft Engines
  • Non-Linear Finite Element Analysis in Structural Mechanics
Full Description
Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book is a comprehensive presentation of embedded Java security. It is compared with the security model of the Java 2 Standard Edition in order to view the impact of limited resources on security. The main components of embedded Java are also generally presented to give an idea about the platform architecture. To assess the effectiveness of the security model, an evaluation of the security features is carried out with results presented in the framework of the MEHARI method for risk analysis, and the Common Criteria methodology of security evaluation. The usefulness of this security evaluation is to point out areas that need security hardening. This book provides researchers and practitioners alike with a broader and deeper understanding of the issues involved in embedded Java security, and –as a larger view- mobile devices security.
Table of Contents

Table of Contents

  1. Introduction.
  2. J2ME
  3. CLDC.
  4. J2ME
  5. CLDC Security Evaluation.
  6. Risk Analysis.
  7. Security Evaluation.
  8. Conclusion.
Errata

Please Login to submit errata.

No errata are currently published

Best-Sellers

    1. Pro SQL Server Internals

      $41.99

      View Details

    2. Beginning 3D Game Development with Unity 4

      $34.99

      View Details

    3. Beginning iPhone Development with Swift

      $31.99

      View Details

    4. Financial Modeling for Business Owners and Entrepreneurs

      $31.99

      View Details