32,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
  • Broschiertes Buch

The E2E security model has proven to be the successful security solution for enterprise business and personal applications. Existing wireless security mechanisms does not provide pure E2E security solutions. Realizing its importance, MIDP 2.0 provides full support to E2E wireless security, by including HTTPS, SSL/TLS, and X.509 PKI. MIDP 2.0 adopts several security concepts in its implementation reference such as protection domains, permission types, and authorization modes and trusted MIDlet. In general, the security analysis presented in this book reveals that, MIDP 2.0 provides a good…mehr

Produktbeschreibung
The E2E security model has proven to be the successful security solution for enterprise business and personal applications. Existing wireless security mechanisms does not provide pure E2E security solutions. Realizing its importance, MIDP 2.0 provides full support to E2E wireless security, by including HTTPS, SSL/TLS, and X.509 PKI. MIDP 2.0 adopts several security concepts in its implementation reference such as protection domains, permission types, and authorization modes and trusted MIDlet. In general, the security analysis presented in this book reveals that, MIDP 2.0 provides a good solution to most of the E2E security problems. However, there are still a number of problems; most of these are related to the passive and active attacks that can target SSL handshake protocol, on-device bytecode verifier, X.509 PKI, and protection domains. In addition, the analysis also brings to light several ways to enhance the deployment and robustness of the MIDP 2.0 E2E security solutions. The security mechanisms analyzed in this book make the basic needs of establishing E2E wireless security available for the Java developers and professionals in wireless and mobile communications.
Autorenporträt
Kadhim Hayawi, CCSP, GCIA, CCNA, MSc in Computer Science from Dalhousie University. Instructor of InfoSec at College of IT, UAE University. He has worked in the InfoSec, Networking, and communication for 17 years, with jobs in design, consulting and teaching. He holds the 4013 Information Assurance and 4011 Information Systems Security Recognitions.