A timely reference that explores the topic more broadly than other books, thoroughly discussing wireless security issues from physical layer to application layer. With the introduction of third generation wireless networks, wireless LANs, Bluetooth, and sensor networks, wireless computing is expanding rapidly. However, security is a major concern for wide deployments of wireless networks. This book identifies important vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, and offers ways to strengthen security and services throughout.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
<p>This timely volume, <strong>Wireless Network Security</strong>, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers.</p><p><br>The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.</p>
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. A timely volume thoroughly treating wireless security issues, including discussions of issues with all the layers from physical layer to application layer, that approaches the topic more broadly than other books currently on the marketThis boo. Codice articolo 4174286
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. 432 pp. Englisch. Codice articolo 9781441939197
Quantità: 2 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 432 pp. Englisch. Codice articolo 9781441939197
Quantità: 1 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers.The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues. Codice articolo 9781441939197
Quantità: 1 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9781441939197_new
Quantità: Più di 20 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Mar2411530295424
Quantità: Più di 20 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 432. Codice articolo 263108420
Quantità: 4 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. Print on Demand pp. 432 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. Codice articolo 5820827
Quantità: 4 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. PRINT ON DEMAND pp. 432. Codice articolo 183108430
Quantità: 4 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 424 pages. 9.00x6.00x0.98 inches. In Stock. Codice articolo x-1441939199
Quantità: 2 disponibili