|
|
|
|
LEADER |
00000nam a2200000 i 4500 |
001 |
MGH_AEccn00214111 |
003 |
IN-ChSCO |
005 |
20210416124538.0 |
006 |
m||||||||||||||||| |
007 |
cr |n||||||||n |
008 |
210416s2002||||nyu|||||o|||||||||||eng|| |
010 |
|
|
|z 2002282223
|
020 |
|
|
|a 0071449760
|
020 |
|
|
|a 0071380388 (print-ISBN)
|
020 |
|
|
|a 9780071380386
|
035 |
|
|
|a (OCoLC)50321575
|
040 |
|
|
|a IN-ChSCO
|b eng
|e rda
|
041 |
0 |
|
|a eng
|
050 |
|
4 |
|a TK5102.85
|
082 |
0 |
4 |
|a 005.8
|2 21
|
100 |
1 |
|
|a Nichols, Randall K.,
|e author.
|
245 |
1 |
0 |
|a Wireless security :
|b models, threats, and solutions /
|c Randall K. Nichols, Panos C. Lekkas.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a New York, N.Y. :
|b McGraw-Hill Education,
|c [2002]
|
264 |
|
4 |
|c ?2002
|
300 |
|
|
|a 1 online resource (xliii, 657 pages) :
|b illustrations.
|
336 |
|
|
|a text
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
490 |
1 |
|
|a McGraw-Hill's AccessEngineering
|
500 |
|
|
|a Print version c2002.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Chapter 1 Why is Wireless Different? -- Chapter 2 Wireless Information Warfare -- Chapter 3 Telephone System Vulnerabilities -- Chapter 4 Satellite Communications -- Chapter 5 Cryptographic Security -- Chapter 6 Speech Cryptology -- Chapter 7 The Wireless Local Area Network (WLAN) -- Chapter 8 Wireless Application Protocol (WAP) -- Chapter 9 Wireless Transport Layer Security (WTLS) -- Chapter 10 Bluetooth Chapter -- 11 Voice Over Internet Protocol -- Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications -- Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.
|
520 |
0 |
|
|a Nichols and Lekkas uncover the threats and vunerablilities unique to the wireless communication, telecom, broadband, and satellite markets. They provide an overview of current commercial security solutions available on the open market.
|
530 |
|
|
|a Also available in print edition.
|
533 |
|
|
|a Electronic reproduction.
|b New York, N.Y. :
|c McGraw Hill,
|d 2002.
|n Mode of access: World Wide Web.
|n System requirements: Web browser.
|n Access may be restricted to users at subscribing institutions.
|
538 |
|
|
|a Mode of access: Internet via World Wide Web.
|
545 |
0 |
|
|a Contributor biographical information
|u http://www.loc.gov/catdir/bios/mh041/2002282223.html
|
546 |
|
|
|a In English.
|
588 |
|
|
|a Description based on cover image and table of contents, viewed on April 16, 2007.
|
650 |
|
0 |
|a Wireless communication systems
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Information warfare.
|
650 |
|
0 |
|a Cyberterrorism
|x Prevention.
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Internet telephony
|x Security measures.
|
650 |
|
0 |
|a Wireless LANS
|x Security measures.
|
650 |
|
0 |
|a Artificial satellites in telecommunications.
|
650 |
|
0 |
|a Computers
|x Access control.
|
655 |
|
0 |
|a Electronic books.
|
700 |
1 |
|
|a Lekkas, Panos C.
|
740 |
0 |
2 |
|a Why is wireless different.
|
740 |
0 |
2 |
|a Wireless information warfare.
|
740 |
0 |
2 |
|a Telephone system vulnerabilities.
|
740 |
0 |
2 |
|a Satellite communications.
|
740 |
0 |
2 |
|a Cryptographic security.
|
740 |
0 |
2 |
|a Speech cryptology.
|
740 |
0 |
2 |
|a Wireless local area network (WLAN).
|
740 |
0 |
2 |
|a Wireless application protocol (WAP).
|
740 |
0 |
2 |
|a Wireless transport layer security (WTLS).
|
740 |
0 |
2 |
|a Bluetooth.
|
740 |
0 |
2 |
|a Voice over internet protocol.
|
740 |
0 |
2 |
|a Hardware perspectives for end-to-end security (E2E) in wireless applications.
|
740 |
0 |
2 |
|a Optimizing wireless security with FPGAs and ASICs.
|
776 |
0 |
|
|i Print version:
|t Wireless security : models, threats, and solutions.
|b First edition.
|d New York, N.Y. : McGraw-Hill Education, 2002
|w (OCoLC)47938816
|
830 |
|
0 |
|a McGraw-Hill's AccessEngineering.
|
856 |
4 |
0 |
|u https://accessengineeringlibrary.uam.elogim.com/content/book/9780071380386
|z Texto completo
|
997 |
|
|
|a (c)2007 Cassidy Cataloguing Services, Inc.
|