Search For:

Displaying 1-2 out of 2 total
Management of hidden risks
Found in: Computer
By K.J. Hole
Issue Date:January 2013
pp. 65-70
The ability to recover quickly from large-impact, hard-to-predict, and rare incidents without incurring sizable permanent damage is vital to major stakeholders in ICT infrastructures of national importance.
Challenges in securing networked J2ME applications
Found in: Computer
By A.N. Klingsheim,V. Moen,K.J. Hole
Issue Date:February 2007
pp. 24-30
An increasing number of smart phones support Java 2, Micro Edition. Mobile application developers must deal with J2ME's inherent security weaknesses as well as bugs in implementations on real devices. The new Security and Trust Services API for J2ME addres...