EUR 93,08
Portofrei*
Alle Preise inkl. MwSt.
Versandfertig in 3-5 Tagen
Bequeme Ratenzahlung möglich!
ab EUR 4,54 monatlich

  • Gebundenes Buch

Jetzt bewerten

This book is a comprehensive presentation of embedded Java security. No other book specifically addresses the topic of embedded Java security. The main components of embedded Java are also generally presented to give an idea about the platform architecture.

Produktbeschreibung
This book is a comprehensive presentation of embedded Java security. No other book specifically addresses the topic of embedded Java security. The main components of embedded Java are also generally presented to give an idea about the platform architecture.
  • Produktdetails
  • Verlag: Springer, Berlin
  • Best.Nr. des Verlages: 11667285
  • 2007.
  • Seitenzahl: 260
  • 2007
  • Ausstattung/Bilder: 2007. xiv, 246 S. 38 SW-Abb., 37 Tabellen
  • Englisch
  • Abmessung: 235mm x 155mm x 22mm
  • Gewicht: 490g
  • ISBN-13: 9781846285905
  • ISBN-10: 1846285909
  • Best.Nr.: 20880168
Inhaltsangabe
Java ME Platform.- Java ME Virtual Machines.- Connected Limited Device Configuration.- Mobile Information Device Profile.- Java ME-CLDC Security.- Java ME CLDC Security Analysis.- Risk Analysis.- Common Criteria Investigation.- Standards.- Conclusion.
Rezensionen
From the reviews:

"This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems."

(D. Grigoras, Computing Reviews, December, 2008)
From the reviews: "This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems." (D. Grigoras, Computing Reviews, December, 2008)
From the reviews:

"This book addresses the very important and timely topic of security on mobile wireless devices. ... this is a convincing book, written in a clear style, that addresses a hot topic. It can be very useful to postgraduates and security engineers, who design or manage mobile systems." (D. Grigoras, Computing Reviews, December, 2008)