19.10 Summary In this chapter, we discussed the need for advanced mobile security and the toolkits to implement it. All the tools have reasonable feature support and performance on CDC-based devices. However, cryptographic support on MIDP devices is highly vendor-dependent. It is important that we choose the right tools based on our specific application needs. Next, we really dive into those toolkits and give concrete examples of how to implement common security tasks using each of them. |