Image from Google Jackets

Virtualization techniques for mobile systems / David Jaramillo, Borko Furht, Ankur Agarwal.

By: Contributor(s): Material type: TextTextSeries: Multimedia systems and applicationsPublication details: Cham : Springer International Publishing, c.2014.Description: xiv, 73 p. : charts, forms, photographs ; 24 cmISBN:
  • 9783319057415 (eBook)
  • 9783319057408
Subject(s): Genre/Form: DDC classification:
  • 004.6 22 JAR
Summary: This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
Book - Borrowing Book - Borrowing Central Library Lower Floor Baccah 004.6 JAR (Browse shelf(Opens below)) Available 000038427
Total holds: 0

Bibliography : p. 69-73.

This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.

There are no comments on this title.

to post a comment.