Book description
This book provides readers at all levels of technical expertise with an understanding of mobile device concepts, application development processes, networking and infrastructure, and security methods. In chapters contributed by engineers with extensive real-world experience in the mobile and wireless field, the book offers insights into the tools and technologies critical to evaluating and implementing mobile strategies. The contributors illustrate proven best practices and methodologies using real-world case studies drawn from their extensive experiences with mobile software and infrastructures for enterprise customers.
Table of contents
- Cover
- Half Title
- Title Page
- Copyright Page
- Dedication
- Table of Contents
- Foreword
- Acknowledgments
- Contributors
- Introduction
-
Section I: Mobile in Action
- Chapter 1: The Evolution of Mobile (1/4)
- Chapter 1: The Evolution of Mobile (2/4)
- Chapter 1: The Evolution of Mobile (3/4)
- Chapter 1: The Evolution of Mobile (4/4)
- Chapter 2: Site Detection (1/4)
- Chapter 2: Site Detection (2/4)
- Chapter 2: Site Detection (3/4)
- Chapter 2: Site Detection (4/4)
- Chapter 3: Mobile Software (1/4)
- Chapter 3: Mobile Software (2/4)
- Chapter 3: Mobile Software (3/4)
- Chapter 3: Mobile Software (4/4)
- Chapter 4: Enterprise Mobile Strategy (1/2)
- Chapter 4: Enterprise Mobile Strategy (2/2)
-
Section II: Designing Mobile Apps
- Chapter 5: App Strategy (1/3)
- Chapter 5: App Strategy (2/3)
- Chapter 5: App Strategy (3/3)
- Chapter 6: Push Messaging (1/5)
- Chapter 6: Push Messaging (2/5)
- Chapter 6: Push Messaging (3/5)
- Chapter 6: Push Messaging (4/5)
- Chapter 6: Push Messaging (5/5)
- Chapter 7: Mobile Databases (1/3)
- Chapter 7: Mobile Databases (2/3)
- Chapter 7: Mobile Databases (3/3)
- Chapter 8: Mobile Application Development (1/8)
- Chapter 8: Mobile Application Development (2/8)
- Chapter 8: Mobile Application Development (3/8)
- Chapter 8: Mobile Application Development (4/8)
- Chapter 8: Mobile Application Development (5/8)
- Chapter 8: Mobile Application Development (6/8)
- Chapter 8: Mobile Application Development (7/8)
- Chapter 8: Mobile Application Development (8/8)
-
Section III: Mobile Services
- Chapter 9: Mobile Standards (1/7)
- Chapter 9: Mobile Standards (2/7)
- Chapter 9: Mobile Standards (3/7)
- Chapter 9: Mobile Standards (4/7)
- Chapter 9: Mobile Standards (5/7)
- Chapter 9: Mobile Standards (6/7)
- Chapter 9: Mobile Standards (7/7)
- Chapter 10: Cellular Access Systems (1/2)
- Chapter 10: Cellular Access Systems (2/2)
- Chapter 11: Wireless Access Systems (1/4)
- Chapter 11: Wireless Access Systems (2/4)
- Chapter 11: Wireless Access Systems (3/4)
- Chapter 11: Wireless Access Systems (4/4)
- Chapter 12: Traffic Delivery (1/2)
- Chapter 12: Traffic Delivery (2/2)
- Chapter 13: Proximity Communications (1/2)
- Chapter 13: Proximity Communications (2/2)
-
Section IV: Security and Data Analysis
- Chapter 14: Mobile Encryption (1/2)
- Chapter 14: Mobile Encryption (2/2)
- Chapter 15: Mobile Forensics (1/7)
- Chapter 15: Mobile Forensics (2/7)
- Chapter 15: Mobile Forensics (3/7)
- Chapter 15: Mobile Forensics (4/7)
- Chapter 15: Mobile Forensics (5/7)
- Chapter 15: Mobile Forensics (6/7)
- Chapter 15: Mobile Forensics (7/7)
- Chapter 16: Mobile Device Security (1/3)
- Chapter 16: Mobile Device Security (2/3)
- Chapter 16: Mobile Device Security (3/3)
- Chapter 17: Corporate Security for Mobile Devices (1/3)
- Chapter 17: Corporate Security for Mobile Devices (2/3)
- Chapter 17: Corporate Security for Mobile Devices (3/3)
- Chapter 18: Mobile Device Management (MDM) (1/4)
- Chapter 18: Mobile Device Management (MDM) (2/4)
- Chapter 18: Mobile Device Management (MDM) (3/4)
- Chapter 18: Mobile Device Management (MDM) (4/4)
Product information
- Title: Mobile Devices
- Author(s):
- Release date: March 2015
- Publisher(s): Chapman and Hall/CRC
- ISBN: 9781466594173
You might also like
book
BEEP: The Definitive Guide
If you need to design a protocol that really fits your application, you want BEEP--an integrated …
book
Security and Privacy in Cyber-Physical Systems
Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this …
book
Cyber Breach Response That Actually Works
You will be breached—the only question is whether you'll be ready A cyber breach could cost …
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …