|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocn228407058 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
080520s2006 maua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCLCQ
|d OCLCF
|d OCLCE
|d E7B
|d BUF
|d YDXCP
|d OCLCO
|d FVL
|d OCLCQ
|d P4I
|d OCLCQ
|d NLGGC
|d OCLCQ
|d AZK
|d COCUF
|d CNNOR
|d MOR
|d PIFAG
|d OTZ
|d OCLCQ
|d WY@
|d U3W
|d BRL
|d STF
|d WRM
|d JBG
|d OCLCQ
|d VTS
|d INT
|d VT2
|d CUY
|d OCLCQ
|d WYU
|d A6Q
|d OCLCQ
|d K6U
|d CEF
|d M8D
|d UKAHL
|d HS0
|d UKCRE
|d AGLDB
|d IEEEE
|d OCLCO
|d OCLCQ
|d ANO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 232333708
|a 607647804
|a 609260368
|a 659287225
|a 722650481
|a 728022868
|a 961545318
|a 962668052
|a 974197429
|a 981400213
|a 981621761
|a 988488532
|a 991945517
|a 992033073
|a 995038998
|a 1005949435
|a 1018083785
|a 1037508800
|a 1038593523
|a 1043036561
|a 1053528349
|a 1055393191
|a 1063965085
|a 1076307945
|a 1081252109
|a 1089311440
|a 1096473617
|a 1153518941
|a 1156976142
|a 1228600223
|a 1248608501
|
020 |
|
|
|a 9781596930094
|q (electronic bk.)
|
020 |
|
|
|a 1596930098
|q (electronic bk.)
|
020 |
|
|
|z 159693008X
|
020 |
|
|
|z 9781596930087
|
029 |
1 |
|
|a AU@
|b 000051410834
|
029 |
1 |
|
|a DEBBG
|b BV043101532
|
029 |
1 |
|
|a DEBSZ
|b 422135968
|
029 |
1 |
|
|a GBVCP
|b 802579493
|
029 |
1 |
|
|a NZ1
|b 13518285
|
035 |
|
|
|a (OCoLC)228407058
|z (OCoLC)232333708
|z (OCoLC)607647804
|z (OCoLC)609260368
|z (OCoLC)659287225
|z (OCoLC)722650481
|z (OCoLC)728022868
|z (OCoLC)961545318
|z (OCoLC)962668052
|z (OCoLC)974197429
|z (OCoLC)981400213
|z (OCoLC)981621761
|z (OCoLC)988488532
|z (OCoLC)991945517
|z (OCoLC)992033073
|z (OCoLC)995038998
|z (OCoLC)1005949435
|z (OCoLC)1018083785
|z (OCoLC)1037508800
|z (OCoLC)1038593523
|z (OCoLC)1043036561
|z (OCoLC)1053528349
|z (OCoLC)1055393191
|z (OCoLC)1063965085
|z (OCoLC)1076307945
|z (OCoLC)1081252109
|z (OCoLC)1089311440
|z (OCoLC)1096473617
|z (OCoLC)1153518941
|z (OCoLC)1156976142
|z (OCoLC)1228600223
|z (OCoLC)1248608501
|
042 |
|
|
|a dlr
|
050 |
|
4 |
|a TK5103.2
|b .A435 2006eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a TEC
|x 034000
|2 bisacsh
|
072 |
|
7 |
|a TEC
|x 061000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.384
|2 22
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Aissi, Selim.
|
245 |
1 |
0 |
|a Security for mobile networks and platforms /
|c Selim Aissi, Nora Dabbous, Anand R. Prasad.
|
260 |
|
|
|a Norwood, MA :
|b Artech House,
|c ©2006.
|
300 |
|
|
|a 1 online resource (xvi, 313 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
490 |
1 |
|
|a Artech House universal personal communications series
|
504 |
|
|
|a Includes bibliographical references and index.
|
506 |
|
|
|3 Use copy
|f Restrictions unspecified
|2 star
|5 MiAaHDL
|
533 |
|
|
|a Electronic reproduction.
|b [Place of publication not identified] :
|c HathiTrust Digital Library,
|d 2010.
|5 MiAaHDL
|
538 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
|u http://purl.oclc.org/DLF/benchrepro0212
|5 MiAaHDL
|
583 |
1 |
|
|a digitized
|c 2010
|h HathiTrust Digital Library
|l committed to preserve
|2 pda
|5 MiAaHDL
|
588 |
0 |
|
|a Print version record.
|
520 |
3 |
|
|a With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats.
|c Publisher abstract.
|
505 |
0 |
|
|a Security for Mobile Networks and Platforms; Contents v; Preface xv; 1 Introduction 1; 2 Authentication, Authorization, and Non-Repudiation 13; 3 Cryptographic Techniques 23; 4 Hardware Security 45; 5 Software Security 67; 6 Security Certification and Evaluation 93; 7 Higher Layer Security 105; 8 IP Layer Security 117; 9 AAA 135; 10 IEEE 802.1X and EAP 149; 11 WPAN Security 163; 12 WLANs Security 177; 13 WMAN 217; 14 WWAN Security 231; 15 Future Security Challenges 245; 16 Mobile Security Threat Catalog 277; List of Acronyms 287; About the Authors 301; Index 303
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Radio.
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Mobile & Wireless Communications.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
653 |
|
|
|a Mobile Communication
|
653 |
|
|
|a Technology, Engineering, Agriculture
|
653 |
|
|
|a Technologie, Ingenieurswissenschaft, Landwirtschaft
|
653 |
|
|
|a Technologie, ingénierie et agriculture
|
653 |
|
|
|a Energy technology & engineering
|
653 |
|
|
|a Energietechnik, Elektrotechnik und Energiemaschinenbau
|
653 |
|
|
|a Génie industriel
|
653 |
|
|
|a Electrical engineering
|
653 |
|
|
|a Elektrotechnik
|
653 |
|
|
|a Electrotechnique
|
700 |
1 |
|
|a Dabbous, Nora.
|
700 |
1 |
|
|a Prasad, Anand.
|
776 |
0 |
8 |
|i Print version:
|a Aissi, Selim.
|t Security for mobile networks and platforms.
|d Norwood, MA : Artech House, ©2006
|z 159693008X
|z 9781596930087
|w (DLC) 2006284848
|w (OCoLC)70997875
|
830 |
|
0 |
|a Artech House universal personal communications series.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=225211
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28882030
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 225211
|
938 |
|
|
|a IEEE
|b IEEE
|n 9101096
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2812276
|
994 |
|
|
|a 92
|b IZTAP
|