Cargando…

Wireless Communications Security : Solutions for the Internet of Things.

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Penttinen, Jyrki T. J.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : Wiley, 2016.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_ocn959149352
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 160924s2016 nju o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d IDB  |d YDX  |d REB  |d OCLCQ  |d MERUC  |d ZCU  |d ICG  |d OCLCF  |d OCLCO  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 958864553 
020 |a 9781119084419 
020 |a 1119084415 
020 |z 1119084393 
020 |z 9781119084396 
029 1 |a AU@  |b 000059955532 
035 |a (OCoLC)959149352  |z (OCoLC)958864553 
050 4 |a TK5103.2.P445 2017 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Penttinen, Jyrki T. J. 
245 1 0 |a Wireless Communications Security :  |b Solutions for the Internet of Things. 
260 |a Newark :  |b Wiley,  |c 2016. 
300 |a 1 online resource (434 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Title Page; Table of Contents; About the Author; Preface; Acknowledgements; Abbreviations; 1 Introduction; 1.1 Introduction; 1.2 Wireless Security; 1.3 Standardization; 1.4 Wireless Security Principles; 1.5 Focus and Contents of the Book; References; 2 Security of Wireless Systems; 2.1 Overview; 2.2 Effects of Broadband Mobile Data; 2.3 GSM; 2.4 UMTS/HSPA; 2.5 Long Term Evolution; 2.6 Security Aspects of Other Networks; 2.7 Interoperability; References; 3 Internet of Things; 3.1 Overview; 3.2 Foundation; 3.3 Development of IoT; 3.4 Technical Description of IoT; References. 
505 8 |a 4 Smartcards and Secure Elements4.1 Overview; 4.2 Role of Smartcards and SEs; 4.3 Contact Cards; 4.4 The SIM/UICC; 4.5 Contents of the SIM; 4.6 Embedded SEs; 4.7 Other Card Types; 4.8 Contactless Cards; 4.9 Electromechanical Characteristics of Smartcards; 4.10 Smartcard SW; 4.11 UICC Communications; References; 5 Wireless Payment and Access Systems; 5.1 Overview; 5.2 Wireless Connectivity as a Base for Payment and Access; 5.3 E-commerce; 5.4 Transport; 5.5 Other Secure Systems; References; 6 Wireless Security Platforms and Functionality; 6.1 Overview; 6.2 Forming the Base. 
505 8 |a 6.3 Remote Subscription Management6.4 Tokenization; 6.5 Other Solutions; References; 7 Mobile Subscription Management; 7.1 Overview; 7.2 Subscription Management; 7.3 OTA Platforms; 7.4 Evolved Subscription Management; References; 8 Security Risks in the Wireless Environment; 8.1 Overview; 8.2 Wireless Attack Types; 8.3 Security Flaws on Mobile Networks; 8.4 Protection Methods; 8.5 Errors in Equipment Manufacturing; 8.6 Self-Organizing Network Techniques for Test and Measurement; References; 9 Monitoring and Protection Techniques; 9.1 Overview; 9.2 Personal Devices. 
505 8 |a 9.3 IP Core Protection Techniques9.4 HW Fault and Performance Monitoring; 9.5 Security Analysis; 9.6 Virus Protection; 9.7 Legal Interception; 9.8 Personal Safety and Privacy; References; 10 Future of Wireless Solutions and Security; 10.1 Overview; 10.2 IoT as a Driving Force; 10.3 Evolution of 4G; 10.4 Development of Devices; 10.5 5G Mobile Communications; References; Index; End User License Agreement. 
520 8 |a Annotation  |b The development of the wireless communications environment, especially as related to security, has been relatively stable compared to the issues of fixed Internet. Nevertheless, along with the enhanced functionalities of smart devices, networks and applications, the level of malicious attacks has increased considerably. It can be estimated that security attacks, distribution of viruses and other malicious activities increase in the wireless environment along with the higher number of users. Not only are payment activities, person-to-person communications and social media utilization under constant threat, but furthermore, one of the strongly increasing security risks is related to M2M (Machine-to-Machine) communications. This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Wireless communication systems  |x Security measures. 
650 0 |a Internet  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Transmission sans fil  |x Sécurité  |x Mesures. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
650 7 |a Wireless communication systems  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Penttinen, Jyrki T.J.  |t Wireless Communications Security : Solutions for the Internet of Things.  |d Newark : Wiley, ©2016  |z 9781119084396 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4690021  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4690021 
938 |a YBP Library Services  |b YANK  |n 13230323 
938 |a YBP Library Services  |b YANK  |n 13216520 
938 |a YBP Library Services  |b YANK  |n 13173445 
994 |a 92  |b IZTAP