000 | 03709nam a22003975i 4500 | ||
---|---|---|---|
001 | 291600 | ||
003 | MX-SnUAN | ||
005 | 20170705134223.0 | ||
007 | cr nn 008mamaa | ||
008 | 150903s2007 xxk| o |||| 0|eng d | ||
020 |
_a9781846287114 _99781846287114 |
||
024 | 7 |
_a10.1007/9781846287114 _2doi |
|
035 | _avtls000343965 | ||
039 | 9 |
_a201509030356 _bVLOAD _c201405050300 _dVLOAD _y201402061244 _zstaff |
|
040 |
_aMX-SnUAN _bspa _cMX-SnUAN _erda |
||
050 | 4 | _aQA76.9.C643 | |
100 | 1 |
_aDebbabi, Mourad. _eautor _9322975 |
|
245 | 1 | 0 |
_aEmbedded Java Security : _bSecurity for Mobile Devices / _cby Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, Sami Zhioua. |
264 | 1 |
_aLondon : _bSpringer London, _c2007. |
|
300 |
_axii, 243 páginas _brecurso en línea. |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
500 | _aSpringer eBooks | ||
505 | 0 | _aJava ME Platform -- Java ME Virtual Machines -- Connected Limited Device Configuration -- Mobile Information Device Profile -- Java ME-CLDC Security -- Java ME CLDC Security Analysis -- Risk Analysis -- Common Criteria Investigation -- Standards -- Conclusion. | |
520 | _aWhereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects of Java and offers a security evaluation for the Java platform. After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations. Topics and features: • Presents the security model underlying Java ME • Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities • Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework • Discusses the most prominent standards that are relevant for Java ME security • Reports on areas of common vulnerabilities, and considers specifications and programming mistakes • Hints and suggestions are provided as ways for hardening security This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guide for self study in the field. | ||
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aSaleh, Mohamed. _eautor _9322976 |
|
700 | 1 |
_aTalhi, Chamseddine. _eautor _9322977 |
|
700 | 1 |
_aZhioua, Sami. _eautor _9322978 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9781846285905 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-1-84628-711-4 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c291600 _d291600 |