Overview
- Shows how to partition mobile devices to separate the enterprise system access and the personal information
- Describes a reference architecture that allows for integration with existing mobile device systems
- Provides statistical analysis to help identify the performance of the virtualization technologies tested across the various platforms
- Includes supplementary material: sn.pub/extras
Part of the book series: Multimedia Systems and Applications (MMSA)
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
Similar content being viewed by others
Keywords
Table of contents (7 chapters)
Reviews
From the book reviews:
“A good source for background and high-level technical issues in mobile virtualization, this brief book presents the existing virtualization techniques on mobile systems … . For scientists, researchers, and technicians unfamiliar with virtualization technology in mobile systems, this book is a good start before diving into more advanced and in-depth books and articles. Finally, if you are just curious about the up-to-date advancement of technology, this book is the right choice.” (Long Wang, Computing Reviews, August, 2014)Authors and Affiliations
Bibliographic Information
Book Title: Virtualization Techniques for Mobile Systems
Authors: David Jaramillo, Borko Furht, Ankur Agarwal
Series Title: Multimedia Systems and Applications
DOI: https://doi.org/10.1007/978-3-319-05741-5
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer International Publishing Switzerland 2014
Hardcover ISBN: 978-3-319-05740-8Published: 12 June 2014
Softcover ISBN: 978-3-319-38180-0Published: 17 September 2016
eBook ISBN: 978-3-319-05741-5Published: 19 May 2014
Series ISSN: 1568-2358
Series E-ISSN: 2945-5715
Edition Number: 1
Number of Pages: XIV, 73
Number of Illustrations: 38 b/w illustrations
Topics: Computer Communication Networks, Multimedia Information Systems, Communications Engineering, Networks, Systems and Data Security