Publisher: Prentice Hall PTRPub Date: October 23, 2003
ISBN: 0-13-140530-6
Pages: 480
Slots: 1.0
Copyright
About Prentice Hall Professional Technical Reference
Foreword
About this Book
Target Audience
Prerequisites
Contents
Code Examples
Commercial Products
Related Publications
Production Notes
Acknowledgments
Part I:
Introduction
Chapter 1.
Mobile Commerce: Visions, Realities, and Opportunities
Section 1.1.
Mobile Commerce Value Propositions
Section 1.2.
Mobile Technology Adoption
Section 1.3.
The Search for Killer Mobile Applications
Section 1.4.
Mobile Commerce Landscape
Section 1.5.
Summary
Resources
Chapter 2.
J2ME: Is Mobile Java Ready for Enterprise?
Section 2.1.
Why Java?
Section 2.2.
The Java Community Process
Section 2.3.
Java Everywhere
Section 2.4.
Java 2 Micro Edition Explained
Section 2.5.
Competing Technologies
Section 2.6.
Summary
Resources
Part II:
End-to-End Enterprise Applications
Chapter 3.
The Smart Client Paradigm: iFeedBack
Section 3.1.
Benefits of Smart Clients
Section 3.2.
Introducing iFeedBack
Section 3.3.
iFeedBack Usage Scenarios
Section 3.4.
Implementation Walk Through
Section 3.5.
Summary
Resources
Chapter 4.
Managed Smart Clients
Section 4.1.
Container-Managed Applications
Section 4.2.
OSGi Containers
Section 4.3.
A Simple Echo Service Example
Section 4.4.
Smart Client with HTTP Front End
Section 4.5.
Mobile Gateways
Section 4.6.
Summary
Resources
Chapter 5.
Mobile Design Patterns: The Smart Ticket Blueprint
Section 5.1.
Getting Started
Section 5.2.
Smart Ticket in Action
Section 5.3.
Important Architectural Patterns
Section 5.4.
Implementation Techniques
Section 5.5.
Summary
Resources
Chapter 6.
Advanced HTTP Techniques
Section 6.1.
The Decorator Approach
Section 6.2.
The Process-Chain Approach
Section 6.3.
Session Tracking via HTTP Cookies
Section 6.4.
HTTP Basic Authentication
Section 6.5.
HTTP Digest Authentication
Section 6.6.
Secure HTTP
Section 6.7.
Summary
Resources
Chapter 7.
End-to-End Best Practices
Section 7.1.
Limited Device Hardware
Section 7.2.
Slow, Unreliable Networks
Section 7.3.
Pervasive Devices
Section 7.4.
Ubiquitous Integration
Section 7.5.
The Impatient User
Section 7.6.
Summary
Resources
Part III:
Mobile Messaging Applications
Chapter 8.
Email and PIM
Section 8.1.
Basics of Email
Section 8.2.
Introducing Mail4ME
Section 8.3.
The JavaPhone API
Section 8.4.
The PDA Optional Package
Section 8.5.
Commercial Email and PIM Suites
Section 8.6.
Corporate Portal Servers
Section 8.7.
Summary
Resources
Chapter 9.
Converged Mobile P2P Messaging
Section 9.1.
Introducing the Wireless Messaging API
Section 9.2.
WMA in Action
Section 9.3.
WMA Reference Implementation
Section 9.4.
SMS from the Back End
Section 9.5.
Beyond SMS: The IM Convergence
Section 9.6.
SIP-Based IM Applications
Section 9.7.
Summary
Resources
Chapter 10.
Enterprise Messaging
Section 10.1.
Mobile Enterprise Messaging
Section 10.2.
Introducing the JMS
Section 10.3.
Mobile JMS from iBus//Mobile
Section 10.4.
The IBM WebSphere MQ Everyplace
Section 10.5.
Summary
Resources
Part IV:
Mobile Databases and Synchronization Engines
Chapter 11.
Mobile Database for CDC Devices
Section 11.1.
Database on the Go
Section 11.2.
Introducing JDBC
Section 11.3.
Portable and Efficient Code Using PreparedStatement
Section 11.4.
Access Stored Procedures Using CallableStatement
Section 11.5.
The JDBC Optional Package for the CDC
Section 11.6.
HSQL Database Engine
Section 11.7.
iAnywhere Solutions SQL Anywhere Studio
Section 11.8.
IBM DB2 Everyplace
Section 11.9.
Oracle9i Lite
Section 11.10.
PointBase Micro Edition
Section 11.11.
Example Application: Contact Manager
Section 11.12.
Summary
Resources
Chapter 12.
Mobile Databases for MIDP Devices
Section 12.1.
PointBase Micro Edition
Section 12.2.
The Oracle J2ME SODA SDK
Section 12.3.
The IBM DB2e FastRecordStore
Section 12.4.
Summary
Resources
Chapter 13.
Database Synchronization
Section 13.1.
Synchronization and Mobility
Section 13.2.
PointBase UniSync
Section 13.3.
IBM DB2 Everyplace
Section 13.4.
iAnywhere Solutions MobiLink
Section 13.5.
Oracle9i Mobile Server
Section 13.6.
The Synchronized Contact Manager
Section 13.7.
Summary
Resources
Chapter 14.
Access Backend Databases
Section 14.1.
Direct Access to Remote Databases
Section 14.2.
The Oracle J2ME SQL SDK
Section 14.3.
Legacy Applications
Section 14.4.
Using Simplicity for Legacy Databases
Section 14.5.
Summary
Resources
Part V:
XML and Mobile Web Services
Chapter 15.
XML for Small Devices
Section 15.1.
What Is XML?
Section 15.2.
Challenges for Small Devices
Section 15.3.
XML Parsing Models
Section 15.4.
Introducing Amazon XML Services
Section 15.5.
Amazon Services via XmlPull
Section 15.6.
Amazon Services via kDOM
Section 15.7.
A Mobile RSS Client
Section 15.8.
Summary
Resources
Chapter 16.
SOAP Web Services on Smart Clients
Section 16.1.
What Is SOAP Web Services?
Section 16.2.
Introducing kSOAP
Section 16.3.
kSOAP Explained
Section 16.4.
Advanced kSOAP
Section 16.5.
More kSOAP Examples
Section 16.6.
What''s in kSOAP v2.0?
Section 16.7.
Summary
Resources
Chapter 17.
The J2ME Web Services Optional Package
Section 17.1.
A Little History
Section 17.2.
The XML Processing API
Section 17.3.
The JAX-RPC API
Section 17.4.
The SPI for Implementers
Section 17.5.
Compare with kXML and kSOAP
Section 17.6.
Summary
Resources
Chapter 18.
Case Study: Mobile Clients for Location-Based Services
Section 18.1.
Location-Based Services
Section 18.2.
Microsoft MapPoint Web Services
Section 18.3.
MapPoint J2ME Clients
Section 18.4.
Enhancing the Driving Directions Application
Section 18.5.
Summary
Resources
Part VI:
Advanced Mobile Security
Chapter 19.
Mobile Security for Enterprise
Section 19.1.
What Is Advanced Mobile Security?
Section 19.2.
Lightweight Mobile Cryptography Toolkits
Section 19.3.
Bouncy Castle Lightweight API
Section 19.4.
The IAIK ME JCE
Section 19.5.
Phaos Technology Micro Foundation Toolkit
Section 19.6.
NTRU jNeo for Java Toolkit
Section 19.7.
B3 Security
Section 19.8.
Device-Specific APIs
Section 19.9.
Standardization of J2ME Security APIs
Section 19.10.
Summary
Resources
Chapter 20.
The J2ME Crypto Recipes
Section 20.1.
Overview of Recipes
Section 20.2.
Symmetric Encryption
Section 20.3.
Password-Based Encryption
Section 20.4.
Public Key Encryption
Section 20.5.
Digital Signature
Section 20.6.
Summary
Resources
Appendix A.
Basics of J2ME Application Development
Section A.1.
Life Cycle Methods
Section A.2.
UI Model
Section A.3.
Remote and Local Data
Section A.4.
Code Walk Through
Section A.5.
Packaging and Building
Section A.6.
Deployment
Section A.7.
Summary
Appendix B.
Tools and J2ME Runtimes for PDAs
Section B.1.
Overview of the WebSphere Studio Device Developer
Section B.2.
Installing MIDP on PocketPC Devices
Section B.3.
Installing Personal Profile on PocketPC Devices
Section B.4.
Run Java Applications on the PocketPC Device
Section B.5.
Summary
Top