|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn781402078 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
110609s2006 xx o 000 0 eng |
040 |
|
|
|a AU@
|b eng
|e pn
|c AU@
|d EBLCP
|d OCLCO
|d OCLCQ
|d OCLCF
|d DEBSZ
|d OCLCQ
|d AGLDB
|d ZCU
|d MERUC
|d STF
|d OCLCQ
|d ICG
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1388673769
|
020 |
|
|
|a 9781596930094
|
020 |
|
|
|a 1596930098
|
020 |
|
|
|a 9781596930087
|q (print)
|
020 |
|
|
|a 159693008X
|
029 |
0 |
|
|a AU@
|b 000048831550
|
029 |
1 |
|
|a DEBBG
|b BV044129157
|
029 |
1 |
|
|a DEBSZ
|b 430483759
|
029 |
1 |
|
|a DEBSZ
|b 456434437
|
035 |
|
|
|a (OCoLC)781402078
|z (OCoLC)1388673769
|
050 |
|
4 |
|a TK5103.2
|
072 |
|
0 |
|a TEC008000
|
072 |
|
0 |
|a TEC000000
|
072 |
|
0 |
|a COM043000
|
082 |
0 |
4 |
|a 005.8
|a 621.384
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Aissi, Selim.
|
245 |
1 |
0 |
|a Security in Wireless Networks and Mobile Platforms.
|
260 |
|
|
|a Norwood :
|b Artech House,
|c 2006.
|
300 |
|
|
|a 1 online resource (332 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Artech House Universal Personal Communications
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Security for Mobile Networks and Platforms; Contents v; Preface xv; 1 Introduction 1; 2 Authentication, Authorization, and Non-Repudiation 13; 3 Cryptographic Techniques 23; 4 Hardware Security 45; 5 Software Security 67; 6 Security Certification and Evaluation 93; 7 Higher Layer Security 105; 8 Ip Layer Security 117; 9 Aaa 135; 10 Ieee 802.1X and Eap 149; 11 Wpan Security 163; 12 Wlans Security 177; 13 Wman 217; 14 Wwan Security 231; 15 Future Security Challenges 245; 16 Mobile Security Threat Catalog 277; List of Acronyms 287; About the Authors 301; Index 303.
|
520 |
|
|
|a With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
0 |
|a Wireless communication systems.
|
650 |
|
0 |
|a Engineering.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Electrical engineering.
|
650 |
|
2 |
|a Computer Communication Networks
|
650 |
|
2 |
|a Engineering
|
650 |
|
2 |
|a Electronic Data Processing
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
6 |
|a Systèmes de sécurité.
|
650 |
|
6 |
|a Transmission sans fil.
|
650 |
|
6 |
|a Ingénierie.
|
650 |
|
6 |
|a Informatique.
|
650 |
|
6 |
|a Génie électrique.
|
650 |
|
7 |
|a security systems.
|2 aat
|
650 |
|
7 |
|a engineering.
|2 aat
|
650 |
|
7 |
|a electrical engineering.
|2 aat
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Computer science
|2 fast
|
650 |
|
7 |
|a Electrical engineering
|2 fast
|
650 |
|
7 |
|a Engineering
|2 fast
|
650 |
|
7 |
|a Security systems
|2 fast
|
650 |
|
7 |
|a Wireless communication systems
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Aissi, Selim.
|t Security in Wireless Networks and Mobile Platforms.
|d Norwood : Artech House, ©2006
|z 9781596930087
|
830 |
|
0 |
|a Artech House Universal Personal Communications.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=338731
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL338731
|
994 |
|
|
|a 92
|b IZTAP
|