Cargando…

Wireless security : models, threats, and solutions /

Nichols and Lekkas uncover the threats and vunerablilities unique to the wireless communication, telecom, broadband, and satellite markets. They provide an overview of current commercial security solutions available on the open market.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Nichols, Randall K. (Autor)
Otros Autores: Lekkas, Panos C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, N.Y. : McGraw-Hill Education, [2002]
Edición:First edition.
Colección:McGraw-Hill's AccessEngineering.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000nam a2200000 i 4500
001 MGH_AEccn00214111
003 IN-ChSCO
005 20210416124538.0
006 m|||||||||||||||||
007 cr |n||||||||n
008 210416s2002||||nyu|||||o|||||||||||eng||
010 |z  2002282223 
020 |a 0071449760 
020 |a 0071380388 (print-ISBN) 
020 |a 9780071380386 
035 |a (OCoLC)50321575 
040 |a IN-ChSCO  |b eng  |e rda 
041 0 |a eng 
050 4 |a TK5102.85 
082 0 4 |a 005.8  |2 21 
100 1 |a Nichols, Randall K.,  |e author. 
245 1 0 |a Wireless security :  |b models, threats, and solutions /  |c Randall K. Nichols, Panos C. Lekkas. 
250 |a First edition. 
264 1 |a New York, N.Y. :  |b McGraw-Hill Education,  |c [2002] 
264 4 |c ?2002 
300 |a 1 online resource (xliii, 657 pages) :  |b illustrations. 
336 |a text  |2 rdacontent 
337 |a computer  |2 rdamedia 
338 |a online resource  |2 rdacarrier 
490 1 |a McGraw-Hill's AccessEngineering 
500 |a Print version c2002. 
504 |a Includes bibliographical references and index. 
505 0 |a Chapter 1 Why is Wireless Different? -- Chapter 2 Wireless Information Warfare -- Chapter 3 Telephone System Vulnerabilities -- Chapter 4 Satellite Communications -- Chapter 5 Cryptographic Security -- Chapter 6 Speech Cryptology -- Chapter 7 The Wireless Local Area Network (WLAN) -- Chapter 8 Wireless Application Protocol (WAP) -- Chapter 9 Wireless Transport Layer Security (WTLS) -- Chapter 10 Bluetooth Chapter -- 11 Voice Over Internet Protocol -- Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications -- Chapter 13 Optimizing Wireless Security with FPGAs and ASICs. 
520 0 |a Nichols and Lekkas uncover the threats and vunerablilities unique to the wireless communication, telecom, broadband, and satellite markets. They provide an overview of current commercial security solutions available on the open market. 
530 |a Also available in print edition. 
533 |a Electronic reproduction.  |b New York, N.Y. :  |c McGraw Hill,   |d 2002.  |n Mode of access: World Wide Web.  |n System requirements: Web browser.  |n Access may be restricted to users at subscribing institutions. 
538 |a Mode of access: Internet via World Wide Web. 
545 0 |a Contributor biographical information  |u http://www.loc.gov/catdir/bios/mh041/2002282223.html 
546 |a In English. 
588 |a Description based on cover image and table of contents, viewed on April 16, 2007. 
650 0 |a Wireless communication systems  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Information warfare. 
650 0 |a Cyberterrorism  |x Prevention. 
650 0 |a Cryptography. 
650 0 |a Internet telephony  |x Security measures. 
650 0 |a Wireless LANS  |x Security measures. 
650 0 |a Artificial satellites in telecommunications. 
650 0 |a Computers  |x Access control. 
655 0 |a Electronic books. 
700 1 |a Lekkas, Panos C. 
740 0 2 |a Why is wireless different. 
740 0 2 |a Wireless information warfare. 
740 0 2 |a Telephone system vulnerabilities. 
740 0 2 |a Satellite communications. 
740 0 2 |a Cryptographic security. 
740 0 2 |a Speech cryptology. 
740 0 2 |a Wireless local area network (WLAN). 
740 0 2 |a Wireless application protocol (WAP). 
740 0 2 |a Wireless transport layer security (WTLS). 
740 0 2 |a Bluetooth. 
740 0 2 |a Voice over internet protocol. 
740 0 2 |a Hardware perspectives for end-to-end security (E2E) in wireless applications. 
740 0 2 |a Optimizing wireless security with FPGAs and ASICs. 
776 0 |i Print version:   |t Wireless security : models, threats, and solutions.  |b First edition.  |d New York, N.Y. : McGraw-Hill Education, 2002  |w (OCoLC)47938816 
830 0 |a McGraw-Hill's AccessEngineering. 
856 4 0 |u https://accessengineeringlibrary.uam.elogim.com/content/book/9780071380386  |z Texto completo 
997 |a (c)2007 Cassidy Cataloguing Services, Inc.