"Sinopsis" puede pertenecer a otra edición de este libro.
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications, and much more. The contributions identify various vulnerabilities in the physical layer, MAC layer, IP layer, transport layer, and application layer, and focus on ways for strengthening security mechanisms and services throughout the layers.
The book includes 15 rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless and mobile security related issues.
"Sobre este título" puede pertenecer a otra edición de este libro.
Gastos de envío:
EUR 3,73
A Estados Unidos de America
Descripción Condición: New. pp. 432. Nº de ref. del artículo: 26281955
Descripción Condición: New. pp. 432 Illus. Nº de ref. del artículo: 7598780
Descripción Condición: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service. Nº de ref. del artículo: ABEOCT23-74810
Descripción Condición: New. Brand New Original US Edition.We Ship to PO BOX Address also. EXPEDITED shipping option also available for faster delivery.This item may ship from the US or other locations in India depending on your location and availability. Nº de ref. del artículo: ABTR-227974
Descripción Condición: New. Brand New Original US Edition. Customer service! Satisfaction Guaranteed. This item may ship from the US or our Overseas warehouse depending on your location and stock availability. We Ship to PO BOX Location also. Nº de ref. del artículo: ABRR-227974
Descripción Hardcover. Condición: new. Nº de ref. del artículo: 9780387280400
Descripción Condición: New. Nº de ref. del artículo: ABLIING23Feb2215580171511
Descripción Condición: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Nº de ref. del artículo: ria9780387280400_lsuk
Descripción Buch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. 432 pp. Englisch. Nº de ref. del artículo: 9780387280400
Descripción Gebunden. Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. A timely volume thoroughly treating wireless security issues, including discussions of issues with all the layers from physical layer to application layer, that approaches the topic more broadly than other books currently on the marketThis boo. Nº de ref. del artículo: 5909679