Mobile Devices: Tools and Technologies

Lauren Collins, Scott R. Ellis

March 16, 2015 by Chapman and Hall/CRC
Reference - 339 Pages - 116 B/W Illustrations
ISBN 9781466594166 - CAT# K20661

was $92.95

USD$74.36

SAVE ~$18.59

Add to Wish List
FREE Standard Shipping!

Features

    • Provides examples of mobile network technology at work in real-world settings
    • Examines cutting-edge infrastructure and design for mobile network implementation
    • Presents several case studies to illustrate application of concepts
    • Uses a style of writing that is approachable regardless of the level of knowledge
    • Includes numerous photos, diagrams, screen displays, and charts

    Summary

    Wireless and mobile communications have grown exponentially. The average individual now possesses a minimum of two smart mobile devices. The consistent advancement of mobile devices feeds the ever-growing appetite for faster bandwidth, uninterrupted connectivity, applications to fulfill the needs of consumers and businesses, and security for all of this information. Mobile Devices: Tools and Technologies provides readers at all levels of technical expertise with an understanding of mobile device concepts, application development processes, networking and infrastructure, and security methods.

    This book is organized into four sections, with chapters contributed by engineers with extensive real-world experience in the mobile and wireless field. The first section discusses the current mobile device landscape, including the latest technology innovations, personal and business use trends, and mobile operating systems and applications. The second section focuses on the application development process, from strategy and process through the development phases, to production and launch. This section covers both Android and iOS application development.

    In the third section, the authors explore mobile access standards, network types, and infrastructure components. This section also covers proximity communications standards, including Bluetooth, NFC, and RFID. The book concludes with a look at mobile device security, including mobile encryption methods, wireless security levels, and corporate security and workforce management strategies. Throughout the book, the contributors illustrate proven best practices and methodologies using real-world case studies drawn from their extensive experiences with mobile software and infrastructures for enterprise customers.