Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010038856 | TK5103.2 C69 2001 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
Concise and accessible, Wireless Web brings the big picture of wireless technology into sharp focus for today's business and technical managers. In plain language, the book details how the growth in wireless services affects every corner of the business environment for customers, suppliers, and today's increasingly mobile workforce.
Moving beyond the buzzwords, this book illustrates the exciting new opportunities that "anyplace, anytime" connectivity brings. The book begins with an overview of the wireless web and its advantages, followed by an introduction to the devices, technologies, and emerging standards that are changing the scope of wireless communication. The final section highlights security, which is fundamental to the economic viability of the wireless web.
Wireless Web's highlights include a close look at:
Wireless applications for the business-to-consumer (B2C), business-to-business (B2B), and business-to-employee (B2E) markets How new developments in synchronization and voice are leading to the next generation wireless "killer app" How Bluetooth(tm) networking technology will increase productivity through cross-device communication How wireless local area networks (WLANs) are augmenting and replacing traditional local area networks The technical and political forces behind the new third generation (3G) high speed networks How the WAP(tm), XML, and J2ME standards are fueling the growth of the wireless web Wireless security frameworks, including VPNs, PKI, and digital certificatesComplete with detailed illustrations and a handy glossary of wireless terminology, Wireless Web documents how "no wires" technology is ushering in a world of exciting new possibilities.
0201722178B05232001
Author Notes
Frank P Coyle is Director of the Software Engineering Program at Southern Methodist University, Dallas. He is a frequent speaker at XML DevCon, XML One, and Wireless One. He is co-author of Object-Oriented Cobol published by Cambridge University Press and has published numerous articles on Web and object technologies.
0201722178AB11202001
Table of Contents
Acknowledgments | p. xv |
Introduction | p. xvii |
1. The Wireless Web | |
What Is the Wireless Web? | p. 1 |
The Wireless Advantage | p. 3 |
Localization | p. 3 |
Personalization | p. 4 |
Immediacy and Push | p. 4 |
Wireless Constraints | p. 4 |
Wireless Application Opportunities | p. 7 |
Business-to-Consumer (B2C) | p. 8 |
Business-to-Business (B2B) | p. 11 |
Business-to-Employee (B2E) | p. 14 |
Technology Enablers | p. 17 |
High-Speed Networks | p. 17 |
Synchronization | p. 18 |
Voice | p. 20 |
Summary | p. 26 |
Resources | p. 27 |
Web | p. 27 |
2. The Device Landscape | |
Device Significance | p. 31 |
Wireless Devices | p. 33 |
Mobility versus Interface | p. 33 |
Device Profiles | p. 34 |
Device Categories | p. 34 |
Cell Phones | p. 35 |
Pagers | p. 39 |
Personal Digital Assistants (PDAs) | p. 41 |
Hand-Held PCs | p. 47 |
Convergent Devices | p. 49 |
Device Technologies | p. 50 |
Bluetooth | p. 51 |
Java | p. 53 |
Summary | p. 54 |
Resources | p. 54 |
Books | p. 54 |
Web | p. 54 |
Useful Company Links | p. 56 |
3. Bluetooth | |
Unwired Connectivity | p. 57 |
Bluetooth Technology | p. 59 |
Speed | p. 59 |
Frequency Hopping | p. 61 |
Bluetooth Networking | p. 62 |
Piconets | p. 62 |
Scatternets | p. 64 |
Multimedia Support | p. 64 |
Automotive Bluetooth | p. 65 |
Bluetooth on the Factory Floor | p. 66 |
Notification | p. 66 |
Locating Workers | p. 67 |
Security | p. 67 |
Bluetooth Concerns | p. 68 |
Summary | p. 70 |
Resources | p. 70 |
Books | p. 70 |
Web | p. 70 |
4. Wireless Local Area Networks | |
Why Wireless LANs? | p. 73 |
How Do WLANs Work? | p. 76 |
WLANs in Practice | p. 77 |
WLAN Standards | p. 78 |
IEEE Standards | p. 79 |
HiperLAN2 | p. 82 |
SWAP: The HOMERF Standard | p. 83 |
Bluetooth | p. 84 |
Mobile IP | p. 84 |
How Mobile IP Works | p. 85 |
Summary | p. 87 |
Resources | p. 87 |
Books | p. 87 |
Web | p. 88 |
5. Networks and the Quest for Bandwidth | |
The Quest for Bandwidth | p. 91 |
The Constraints of 2G | p. 93 |
Speed | p. 93 |
Connectivity | p. 93 |
Standards | p. 95 |
GSM | p. 96 |
TDMA | p. 97 |
CDMA | p. 98 |
3G Standards | p. 100 |
Life in the Radio Spectrum | p. 102 |
Spectrum, Auctions, and 3G | p. 105 |
Migration to 3G | p. 107 |
Technopolitics | p. 110 |
Summary | p. 111 |
Resources | p. 111 |
Books | p. 111 |
Web | p. 111 |
6. Wireless Application Protocol (WAP) | |
WAP | p. 115 |
The WAP Forum | p. 116 |
The WAP Framework | p. 117 |
Display Devices | p. 118 |
Content | p. 119 |
Programming | p. 120 |
Architecture | p. 121 |
Protocol | p. 125 |
WAP Push | p. 125 |
Issues for a WAP Future | p. 126 |
Trapped in a Walled Garden? | p. 126 |
WML versus HTML | p. 127 |
What about IP? | p. 128 |
WAP Security | p. 128 |
WAP versus i-mode | p. 128 |
Summary | p. 131 |
Resources | p. 131 |
Books | p. 131 |
Web | p. 132 |
7. XML and Wireless | |
The Data Challenge | p. 133 |
XML in Practice | p. 134 |
Maintaining Data Consistency | p. 135 |
Automatic Transformation | p. 135 |
Separate Content Development | p. 135 |
XML Transformations | p. 136 |
What Is XML? | p. 137 |
XML Origins | p. 139 |
Style Sheets and XSLT | p. 140 |
XSLT | p. 140 |
XSLT Features | p. 141 |
XML-based Wireless Initiatives | p. 142 |
WML | p. 143 |
XHTML | p. 143 |
SyncML | p. 144 |
VoiceXML | p. 144 |
Summary | p. 144 |
Resources | p. 145 |
Books | p. 145 |
Web | p. 146 |
8. Java and Wireless | |
Java | p. 147 |
Application Portability | p. 148 |
Dynamic Delivery of Applications and Services | p. 149 |
Dynamic Upgrades | p. 150 |
Enhanced User Experience | p. 150 |
Disconnected Access | p. 150 |
Security | p. 151 |
Wireless Java | p. 153 |
J2ME Technology | p. 153 |
Java Card Technology | p. 155 |
Java Card Enables M-Commerce | p. 157 |
Java Card and SIMS | p. 157 |
Security | p. 158 |
Biometric Possibilities | p. 158 |
Java Phone API | p. 159 |
The Java Talent Pool | p. 160 |
Summary | p. 160 |
Resources | p. 161 |
Books | p. 161 |
Web | p. 161 |
9. Security | |
Is Wireless Secure? | p. 163 |
Requirements for Wireless Security | p. 164 |
Security Technologies | p. 166 |
Cryptography | p. 166 |
Privacy | p. 170 |
Authentication | p. 171 |
Validation and Digital Hashing | p. 171 |
Digital Signatures | p. 172 |
Working with Digital Signatures | p. 173 |
Managing Certificates and Private Keys | p. 175 |
Storing Private Keys on a Computer | p. 175 |
Smart Card Storage | p. 175 |
Dynamic Creation of Public-Private Key Pairs | p. 176 |
Certificate Authorities | p. 176 |
Device Security | p. 178 |
Liberty Crack: The First Palm Virus | p. 178 |
Cell Phone Viruses | p. 178 |
Wireless Protocol Security | p. 179 |
WAP Security | p. 179 |
WAP Fixes | p. 180 |
GSM Security | p. 181 |
Bluetooth and Security | p. 182 |
Virtual Private Networks (VPNs) | p. 183 |
Summary | p. 185 |
Resources | p. 185 |
Books | p. 185 |
Web | p. 186 |
Glossary | p. 189 |