![](/image/library/english/10153_0131405306_xs.jpg)
Michael Juntao Yuan
![](/image/library/english/10153_btn_start.gif)
Copyright
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Part I:
Introduction
![](/image/library/english/10153_pixel.gif)
Chapter 1.
Mobile Commerce: Visions, Realities, and Opportunities
![](/image/library/english/10153_pixel.gif)
Section 1.1.
Mobile Commerce Value Propositions
![](/image/library/english/10153_pixel.gif)
Section 1.2.
Mobile Technology Adoption
![](/image/library/english/10153_pixel.gif)
Section 1.3.
The Search for Killer Mobile Applications
![](/image/library/english/10153_pixel.gif)
Section 1.4.
Mobile Commerce Landscape
![](/image/library/english/10153_pixel.gif)
Section 1.5.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 2.
J2ME: Is Mobile Java Ready for Enterprise?
![](/image/library/english/10153_pixel.gif)
Section 2.1.
Why Java?
![](/image/library/english/10153_pixel.gif)
Section 2.2.
The Java Community Process
![](/image/library/english/10153_pixel.gif)
Section 2.3.
Java Everywhere
![](/image/library/english/10153_pixel.gif)
Section 2.4.
Java 2 Micro Edition Explained
![](/image/library/english/10153_pixel.gif)
Section 2.5.
Competing Technologies
![](/image/library/english/10153_pixel.gif)
Section 2.6.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Part II:
End-to-End Enterprise Applications
![](/image/library/english/10153_pixel.gif)
Chapter 3.
The Smart Client Paradigm: iFeedBack
![](/image/library/english/10153_pixel.gif)
Section 3.1.
Benefits of Smart Clients
![](/image/library/english/10153_pixel.gif)
Section 3.2.
Introducing iFeedBack
![](/image/library/english/10153_pixel.gif)
Section 3.3.
iFeedBack Usage Scenarios
![](/image/library/english/10153_pixel.gif)
Section 3.4.
Implementation Walk Through
![](/image/library/english/10153_pixel.gif)
Section 3.5.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 4.
Managed Smart Clients
![](/image/library/english/10153_pixel.gif)
Section 4.1.
Container-Managed Applications
![](/image/library/english/10153_pixel.gif)
Section 4.2.
OSGi Containers
![](/image/library/english/10153_pixel.gif)
Section 4.3.
A Simple Echo Service Example
![](/image/library/english/10153_pixel.gif)
Section 4.4.
Smart Client with HTTP Front End
![](/image/library/english/10153_pixel.gif)
Section 4.5.
Mobile Gateways
![](/image/library/english/10153_pixel.gif)
Section 4.6.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 5.
Mobile Design Patterns: The Smart Ticket Blueprint
![](/image/library/english/10153_pixel.gif)
Section 5.1.
Getting Started
![](/image/library/english/10153_pixel.gif)
Section 5.2.
Smart Ticket in Action
![](/image/library/english/10153_pixel.gif)
Section 5.3.
Important Architectural Patterns
![](/image/library/english/10153_pixel.gif)
Section 5.4.
Implementation Techniques
![](/image/library/english/10153_pixel.gif)
Section 5.5.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 6.
Advanced HTTP Techniques
![](/image/library/english/10153_pixel.gif)
Section 6.1.
The Decorator Approach
![](/image/library/english/10153_pixel.gif)
Section 6.2.
The Process-Chain Approach
![](/image/library/english/10153_pixel.gif)
Section 6.3.
Session Tracking via HTTP Cookies
![](/image/library/english/10153_pixel.gif)
Section 6.4.
HTTP Basic Authentication
![](/image/library/english/10153_pixel.gif)
Section 6.5.
HTTP Digest Authentication
![](/image/library/english/10153_pixel.gif)
Section 6.6.
Secure HTTP
![](/image/library/english/10153_pixel.gif)
Section 6.7.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 7.
End-to-End Best Practices
![](/image/library/english/10153_pixel.gif)
Section 7.1.
Limited Device Hardware
![](/image/library/english/10153_pixel.gif)
Section 7.2.
Slow, Unreliable Networks
![](/image/library/english/10153_pixel.gif)
Section 7.3.
Pervasive Devices
![](/image/library/english/10153_pixel.gif)
Section 7.4.
Ubiquitous Integration
![](/image/library/english/10153_pixel.gif)
Section 7.5.
The Impatient User
![](/image/library/english/10153_pixel.gif)
Section 7.6.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Part III:
Mobile Messaging Applications
![](/image/library/english/10153_pixel.gif)
Chapter 8.
Email and PIM
![](/image/library/english/10153_pixel.gif)
Section 8.1.
Basics of Email
![](/image/library/english/10153_pixel.gif)
Section 8.2.
Introducing Mail4ME
![](/image/library/english/10153_pixel.gif)
Section 8.3.
The JavaPhone API
![](/image/library/english/10153_pixel.gif)
Section 8.4.
The PDA Optional Package
![](/image/library/english/10153_pixel.gif)
Section 8.5.
Commercial Email and PIM Suites
![](/image/library/english/10153_pixel.gif)
Section 8.6.
Corporate Portal Servers
![](/image/library/english/10153_pixel.gif)
Section 8.7.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 9.
Converged Mobile P2P Messaging
![](/image/library/english/10153_pixel.gif)
Section 9.1.
Introducing the Wireless Messaging API
![](/image/library/english/10153_pixel.gif)
Section 9.2.
WMA in Action
![](/image/library/english/10153_pixel.gif)
Section 9.3.
WMA Reference Implementation
![](/image/library/english/10153_pixel.gif)
Section 9.4.
SMS from the Back End
![](/image/library/english/10153_pixel.gif)
Section 9.5.
Beyond SMS: The IM Convergence
![](/image/library/english/10153_pixel.gif)
Section 9.6.
SIP-Based IM Applications
![](/image/library/english/10153_pixel.gif)
Section 9.7.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 10.
Enterprise Messaging
![](/image/library/english/10153_pixel.gif)
Section 10.1.
Mobile Enterprise Messaging
![](/image/library/english/10153_pixel.gif)
Section 10.2.
Introducing the JMS
![](/image/library/english/10153_pixel.gif)
Section 10.3.
Mobile JMS from iBus//Mobile
![](/image/library/english/10153_pixel.gif)
Section 10.4.
The IBM WebSphere MQ Everyplace
![](/image/library/english/10153_pixel.gif)
Section 10.5.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Part IV:
Mobile Databases and Synchronization Engines
![](/image/library/english/10153_pixel.gif)
Chapter 11.
Mobile Database for CDC Devices
![](/image/library/english/10153_pixel.gif)
Section 11.1.
Database on the Go
![](/image/library/english/10153_pixel.gif)
Section 11.2.
Introducing JDBC
![](/image/library/english/10153_pixel.gif)
Section 11.3.
Portable and Efficient Code Using PreparedStatement
![](/image/library/english/10153_pixel.gif)
Section 11.4.
Access Stored Procedures Using CallableStatement
![](/image/library/english/10153_pixel.gif)
Section 11.5.
The JDBC Optional Package for the CDC
![](/image/library/english/10153_pixel.gif)
Section 11.6.
HSQL Database Engine
![](/image/library/english/10153_pixel.gif)
Section 11.7.
iAnywhere Solutions SQL Anywhere Studio
![](/image/library/english/10153_pixel.gif)
Section 11.8.
IBM DB2 Everyplace
![](/image/library/english/10153_pixel.gif)
Section 11.9.
Oracle9i Lite
![](/image/library/english/10153_pixel.gif)
Section 11.10.
PointBase Micro Edition
![](/image/library/english/10153_pixel.gif)
Section 11.11.
Example Application: Contact Manager
![](/image/library/english/10153_pixel.gif)
Section 11.12.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 12.
Mobile Databases for MIDP Devices
![](/image/library/english/10153_pixel.gif)
Section 12.1.
PointBase Micro Edition
![](/image/library/english/10153_pixel.gif)
Section 12.2.
The Oracle J2ME SODA SDK
![](/image/library/english/10153_pixel.gif)
Section 12.3.
The IBM DB2e FastRecordStore
![](/image/library/english/10153_pixel.gif)
Section 12.4.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 13.
Database Synchronization
![](/image/library/english/10153_pixel.gif)
Section 13.1.
Synchronization and Mobility
![](/image/library/english/10153_pixel.gif)
Section 13.2.
PointBase UniSync
![](/image/library/english/10153_pixel.gif)
Section 13.3.
IBM DB2 Everyplace
![](/image/library/english/10153_pixel.gif)
Section 13.4.
iAnywhere Solutions MobiLink
![](/image/library/english/10153_pixel.gif)
Section 13.5.
Oracle9i Mobile Server
![](/image/library/english/10153_pixel.gif)
Section 13.6.
The Synchronized Contact Manager
![](/image/library/english/10153_pixel.gif)
Section 13.7.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 14.
Access Backend Databases
![](/image/library/english/10153_pixel.gif)
Section 14.1.
Direct Access to Remote Databases
![](/image/library/english/10153_pixel.gif)
Section 14.2.
The Oracle J2ME SQL SDK
![](/image/library/english/10153_pixel.gif)
Section 14.3.
Legacy Applications
![](/image/library/english/10153_pixel.gif)
Section 14.4.
Using Simplicity for Legacy Databases
![](/image/library/english/10153_pixel.gif)
Section 14.5.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Part V:
XML and Mobile Web Services
![](/image/library/english/10153_pixel.gif)
Chapter 15.
XML for Small Devices
![](/image/library/english/10153_pixel.gif)
Section 15.1.
What Is XML?
![](/image/library/english/10153_pixel.gif)
Section 15.2.
Challenges for Small Devices
![](/image/library/english/10153_pixel.gif)
Section 15.3.
XML Parsing Models
![](/image/library/english/10153_pixel.gif)
Section 15.4.
Introducing Amazon XML Services
![](/image/library/english/10153_pixel.gif)
Section 15.5.
Amazon Services via XmlPull
![](/image/library/english/10153_pixel.gif)
Section 15.6.
Amazon Services via kDOM
![](/image/library/english/10153_pixel.gif)
Section 15.7.
A Mobile RSS Client
![](/image/library/english/10153_pixel.gif)
Section 15.8.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 16.
SOAP Web Services on Smart Clients
![](/image/library/english/10153_pixel.gif)
Section 16.1.
What Is SOAP Web Services?
![](/image/library/english/10153_pixel.gif)
Section 16.2.
Introducing kSOAP
![](/image/library/english/10153_pixel.gif)
Section 16.3.
kSOAP Explained
![](/image/library/english/10153_pixel.gif)
Section 16.4.
Advanced kSOAP
![](/image/library/english/10153_pixel.gif)
Section 16.5.
More kSOAP Examples
![](/image/library/english/10153_pixel.gif)
Section 16.6.
What''s in kSOAP v2.0?
![](/image/library/english/10153_pixel.gif)
Section 16.7.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 17.
The J2ME Web Services Optional Package
![](/image/library/english/10153_pixel.gif)
Section 17.1.
A Little History
![](/image/library/english/10153_pixel.gif)
Section 17.2.
The XML Processing API
![](/image/library/english/10153_pixel.gif)
Section 17.3.
The JAX-RPC API
![](/image/library/english/10153_pixel.gif)
Section 17.4.
The SPI for Implementers
![](/image/library/english/10153_pixel.gif)
Section 17.5.
Compare with kXML and kSOAP
![](/image/library/english/10153_pixel.gif)
Section 17.6.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 18.
Case Study: Mobile Clients for Location-Based Services
![](/image/library/english/10153_pixel.gif)
Section 18.1.
Location-Based Services
![](/image/library/english/10153_pixel.gif)
Section 18.2.
Microsoft MapPoint Web Services
![](/image/library/english/10153_pixel.gif)
Section 18.3.
MapPoint J2ME Clients
![](/image/library/english/10153_pixel.gif)
Section 18.4.
Enhancing the Driving Directions Application
![](/image/library/english/10153_pixel.gif)
Section 18.5.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Part VI:
Advanced Mobile Security
![](/image/library/english/10153_pixel.gif)
Chapter 19.
Mobile Security for Enterprise
![](/image/library/english/10153_pixel.gif)
Section 19.1.
What Is Advanced Mobile Security?
![](/image/library/english/10153_pixel.gif)
Section 19.2.
Lightweight Mobile Cryptography Toolkits
![](/image/library/english/10153_pixel.gif)
Section 19.3.
Bouncy Castle Lightweight API
![](/image/library/english/10153_pixel.gif)
Section 19.4.
The IAIK ME JCE
![](/image/library/english/10153_pixel.gif)
Section 19.5.
Phaos Technology Micro Foundation Toolkit
![](/image/library/english/10153_pixel.gif)
Section 19.6.
NTRU jNeo for Java Toolkit
![](/image/library/english/10153_pixel.gif)
Section 19.7.
B3 Security
![](/image/library/english/10153_pixel.gif)
Section 19.8.
Device-Specific APIs
![](/image/library/english/10153_pixel.gif)
Section 19.9.
Standardization of J2ME Security APIs
![](/image/library/english/10153_pixel.gif)
Section 19.10.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Chapter 20.
The J2ME Crypto Recipes
![](/image/library/english/10153_pixel.gif)
Section 20.1.
Overview of Recipes
![](/image/library/english/10153_pixel.gif)
Section 20.2.
Symmetric Encryption
![](/image/library/english/10153_pixel.gif)
Section 20.3.
Password-Based Encryption
![](/image/library/english/10153_pixel.gif)
Section 20.4.
Public Key Encryption
![](/image/library/english/10153_pixel.gif)
Section 20.5.
Digital Signature
![](/image/library/english/10153_pixel.gif)
Section 20.6.
Summary
![](/image/library/english/10153_pixel.gif)
![](/image/library/english/10153_pixel.gif)
Appendix A.
Basics of J2ME Application Development
![](/image/library/english/10153_pixel.gif)
Section A.1.
Life Cycle Methods
![](/image/library/english/10153_pixel.gif)
Section A.2.
UI Model
![](/image/library/english/10153_pixel.gif)
Section A.3.
Remote and Local Data
![](/image/library/english/10153_pixel.gif)
Section A.4.
Code Walk Through
![](/image/library/english/10153_pixel.gif)
Section A.5.
Packaging and Building
![](/image/library/english/10153_pixel.gif)
Section A.6.
Deployment
![](/image/library/english/10153_pixel.gif)
Section A.7.
Summary
![](/image/library/english/10153_pixel.gif)
Appendix B.
Tools and J2ME Runtimes for PDAs
![](/image/library/english/10153_pixel.gif)
Section B.1.
Overview of the WebSphere Studio Device Developer
![](/image/library/english/10153_pixel.gif)
Section B.2.
Installing MIDP on PocketPC Devices
![](/image/library/english/10153_pixel.gif)
Section B.3.
Installing Personal Profile on PocketPC Devices
![](/image/library/english/10153_pixel.gif)
Section B.4.
Run Java Applications on the PocketPC Device
![](/image/library/english/10153_pixel.gif)
Section B.5.
SummaryTop