ebook img

Mobile Devices: Tools and Technologies PDF

334 Pages·2015·9.627 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Mobile Devices: Tools and Technologies

Information Technology C O L L I N S • MOBILE DEVICES TOOLS AND TECHNOLOGIES E L M o b i l e L I S Wireless and mobile communications have grown exponentially. The average individual now possesses a minimum of two smart mobile devices. The consistent advancement of mobile devices feeds the ever-growing appetite for faster band- width, uninterrupted connectivity, applications to fulfill the needs of consumers and businesses, and security for all of this information. Mobile Devices: Tools and Technologies provides readers at all levels of technical expertise with an under- standing of mobile device concepts, application development processes, network- D e v i c e s ing and infrastructure, and security methods. This book is organized into four sections, with chapters contributed by engineers with extensive real-world experience in the mobile and wireless field. The first section discusses the current mobile device landscape, including the latest M technology innovations, personal and business use trends, and mobile operating systems and applications. The second section focuses on the application develop- O ment process, from strategy and process through the development phases, to B production and launch. This section covers both Android and iOS application development. I T O O L S A N D T E C H N O L O G I E S L In the third section, the authors explore mobile access standards, network types, E and infrastructure components. This section also covers proximity communications standards, including Bluetooth, NFC, and RFID. The book concludes with a look at D mobile device security, including mobile encryption methods, wireless security EDITED BY LAUREN COLLINS • SCOTT R. ELLIS levels, and corporate security and workforce management strategies. Throughout E the book, the contributors illustrate proven best practices and methodologies using V real-world case studies drawn from their extensive experiences with mobile I software and infrastructures for enterprise customers. C Features E S • Examines cutting-edge infrastructure and design for mobile network implementation • Presents several case studies to illustrate application of concepts • Uses a style of writing that is approachable regardless of the level of knowledge • Includes numerous photos, diagrams, screen displays, and charts K20661 ISBN: 978-1-4665-9416-6 90000 9 781466 594166 Mobile Devices Mobile Devices T O O L S A N D T E C H N O L O G I E S EDITED BY LAUREN COLLINS • SCOTT R. ELLIS Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2015 by Taylor & Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Version Date: 20150115 International Standard Book Number-13: 978-1-4665-9417-3 (eBook - PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information stor- age or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro- vides licenses and registration for a variety of users. For organizations that have been granted a photo- copy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the CRC Press Web site at http://www.crcpress.com In memory of Mr., my first love. Your presence is felt in everything I do. Contents Foreword, ix Acknowledgments, xi Contributors, xiii Introduction, xv Section i Mobile in Action chApter 1 ◾ The Evolution of Mobile 3 lAuren collinS chApter 2 ◾ Site Detection 23 lAuren collinS chApter 3 ◾ Mobile Software 41 lAuren collinS chApter 4 ◾ Enterprise Mobile Strategy 57 lAuren collinS And chArlie connor Section ii deSigning Mobile AppS chApter 5 ◾ App Strategy 69 JoniAn MuSA chApter 6 ◾ Push Messaging 81 lAuren collinS chApter 7 ◾ Mobile Databases 103 nAte noonen vii viii ◾ Contents chApter 8 ◾ Mobile Application Development 115 Scott r. elliS Section iii Mobile ServiceS chApter 9 ◾ Mobile Standards 157 Scott r. elliS chApter 10 ◾ Cellular Access Systems 191 lAuren collinS And Scott r. elliS chApter 11 ◾ Wireless Access Systems 201 lAuren collinS chApter 12 ◾ Traffic Delivery 217 lAuren collinS chApter 13 ◾ Proximity Communications 223 lAuren collinS Section iv Security And dAtA AnAlySiS chApter 14 ◾ Mobile Encryption 233 lAuren collinS chApter 15 ◾ Mobile Forensics 239 Scott r. elliS And JoSiAh roloff chApter 16 ◾ Mobile Device Security 271 c.J. WieMer chApter 17 ◾ Corporate Security for Mobile Devices 283 lAuren collinS chApter 18 ◾ Mobile Device Management (MDM) 297 lAuren collinS

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.