tailieunhanh - Webmaster's Guide to the Wireless Internet part 47

Webmaster's Guide to the Wireless Internet part 47. The Webmaster’s Guide to the Wireless Internet provides the Wireless Webmaster with all of the tools necessary to build the next generation Internet. Packed with the essential information they need to design, develop, and secure robust, e-commerce enabled wireless Web sites. This book is written for advanced Webmasters who are experienced with conventional Web site design and are now faced with the challenge of creating sites that fit on the display of a Web enabled phone or PDA | 432 Chapter 10 Securing Your Wireless Web HTML there are several wireless markup languages including Handheld Device Markup Language HDML Wireless Markup Language WML Compact Hypertext Markup Language cHTML Mobile Markup Language MML Extensible Hypertext markup Language XHTML and ordinary HTML as well as multiple technologies to extend browser functionality including WML Script Java 2 Micro Edition J2ME and Qualcomm s Binary Runtime Environment for Wireless BREW which enable remote execution of application code on arbitrary mobile devices. 3G wireless networks and a convergence of standards will eventually result in a relatively homogenous environment for wireless applications but it will be many years from the time of this writing before this transition is complete and legacy devices and networks must be supported throughout these changes. Security on the conventional Web is less complex than wireless security because the Web represents a single paradigm for both application development and security Figure illustrates the differences in security models between the wired Internet and the wireless Web. On the Internet there is one protocol for Web sites and Web-based applications HTTP one transport protocol TCP IP and one dominant security standard SSL also known as secure HTTP or SHTTP . Higher levels of security can be deployed with relative ease by distributing digital certificates that are already supported by Web browsers in a PKI security model. On the Web there is only one markup language HTML and a small number of standardized technologies to enable client-side application logic Java and ActiveX . Web browsers also have a standard plug-in API so that third-party program enhancements can be added to Web private networks VPNs are also used to enable access to private corporate networks from remote locations or machines over the Internet through a secure encrypted can be further controlled by technologies such as .

TỪ KHÓA LIÊN QUAN