Atjaunināt sīkdatņu piekrišanu

E-grāmata: Virtualization Techniques for Mobile Systems

  • Formāts: PDF+DRM
  • Sērija : Multimedia Systems and Applications
  • Izdošanas datums: 19-May-2014
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319057415
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Multimedia Systems and Applications
  • Izdošanas datums: 19-May-2014
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783319057415

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

Recenzijas

From the book reviews:

A good source for background and high-level technical issues in mobile virtualization, this brief book presents the existing virtualization techniques on mobile systems . For scientists, researchers, and technicians unfamiliar with virtualization technology in mobile systems, this book is a good start before diving into more advanced and in-depth books and articles. Finally, if you are just curious about the up-to-date advancement of technology, this book is the right choice. (Long Wang, Computing Reviews, August, 2014)

1 Introduction
1(4)
1.1 Motivation
1(1)
1.2 Enhancing User Productivity
2(1)
1.3 Improving System Security
2(1)
1.4 Contributions
3(1)
1.5 Proposed Methodology/Innovation
4(1)
2 Mobile Virtualization Technologies
5(16)
2.1 Mobile Virtualization via Device Management Policies
5(2)
2.1.1 BlackBerry Balance
6(1)
2.1.2 MobileIron Virtual Smartphone Platform
6(1)
2.2 Mobile Virtualization via Hypervisors
7(8)
2.2.1 KVM on ARM
8(1)
2.2.2 Xen Hypervisor on ARM
8(2)
2.2.3 OKL4 Microvisor: Open Kernel Labs
10(1)
2.2.4 Motorola Evoke AQ4
10(1)
2.2.5 VMWare
11(1)
2.2.6 Red Bend: vLogix Mobile
12(2)
2.2.7 Cells
14(1)
2.2.8 Cellrox
14(1)
2.3 Mobile Separation via Containers
15(4)
2.3.1 Good Dynamics Technology
15(1)
2.3.2 Divide by Enterproid
16(2)
2.3.3 TrustDroid
18(1)
2.3.4 Android 4.2: Multi-User
19(1)
2.4 Summary
19(2)
3 Mobile Virtualization Comparative Analysis
21(6)
3.1 General Platform Support
21(1)
3.2 Device Inventory
21(1)
3.3 Management Actions
22(1)
3.4 Security and Policy Management
22(1)
3.5 Enterprise Access
22(1)
3.6 Application Management
22(1)
3.7 Data Leakage Protection
23(1)
3.8 Comparative Results
23(4)
4 Mobile Virtualization Case Study
27(10)
4.1 Pilot Start
27(1)
4.2 User/Device Comparison
28(1)
4.3 Device Usage Distribution
29(1)
4.4 Pilot Survey
30(5)
4.4.1 Survey Highlights
30(1)
4.4.2 Survey Analysis
30(4)
4.4.3 Container Attributes
34(1)
4.4.4 Pilot Survey Comments
35(1)
4.5 Pilot Summary
35(2)
5 Mobile Virtualization Reference Architecture
37(18)
5.1 Mobile Virtualization Application Container
37(1)
5.2 Benefits of Hybrid Application Development
38(1)
5.3 Hybrid Application Container Requirements
38(4)
5.3.1 Hybrid Application Creation
39(1)
5.3.2 Application Deployment and Updates
39(1)
5.3.3 App Store Model
40(1)
5.3.4 Hybrid Container API
40(1)
5.3.5 Hybrid Container Security
41(1)
5.4 Hybrid Application Container Creation
42(3)
5.4.1 System Architecture
42(1)
5.4.2 Hybrid Container Components
43(2)
5.5 Mobile Virtualization Container Interface
45(4)
5.5.1 MVC Interface Specification
46(1)
5.5.2 MVC Architecture
46(1)
5.5.3 MVC Components
47(1)
5.5.4 Device Query
48(1)
5.5.5 Device Actions
49(1)
5.5.6 Policy Management
49(1)
5.5.7 Data Protection
49(1)
5.6 MVC Interface System Design
49(4)
5.6.1 Device Query
49(2)
5.6.2 Device Actions
51(2)
5.6.3 Data Protection
53(1)
5.7 Summary
53(2)
6 Mobile Virtualization Container Performance Analysis
55(12)
6.1 Performance Benchmark Analysis
55(1)
6.2 Benchmark Components
56(2)
6.2.1 Storage Benchmark
57(1)
6.3 Networking Benchmark
58(1)
6.3.1 Benchmark Data Collection
58(1)
6.4 MVC Benchmark Results
59(6)
6.4.1 Storage Performance Results
59(3)
6.4.2 Networking Performance Results
62(3)
6.5 Summary of Results
65(2)
7 Conclusion, Contributions and Future Work
67(2)
7.1 Conclusion
67(1)
7.2 Contributions
67(1)
7.3 Future Work
68(1)
References 69