Part VI: Advanced Mobile SecurityChapter 19. Mobile Security for EnterpriseChapter 20. The J2ME Crypto Recipes