Loading…

Wireless security : models, threats, and solutions /

Nichols and Lekkas uncover the threats and vunerablilities unique to the wireless communication, telecom, broadband, and satellite markets. They provide an overview of current commercial security solutions available on the open market.

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Nichols, Randall K. (Author)
Other Authors: Lekkas, Panos C.
Format: Electronic eBook
Language:Inglés
Published: New York, N.Y. : McGraw-Hill Education, [2002]
Edition:First edition.
Series:McGraw-Hill's AccessEngineering.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Chapter 1 Why is Wireless Different?
  • Chapter 2 Wireless Information Warfare
  • Chapter 3 Telephone System Vulnerabilities
  • Chapter 4 Satellite Communications
  • Chapter 5 Cryptographic Security
  • Chapter 6 Speech Cryptology
  • Chapter 7 The Wireless Local Area Network (WLAN)
  • Chapter 8 Wireless Application Protocol (WAP)
  • Chapter 9 Wireless Transport Layer Security (WTLS)
  • Chapter 10 Bluetooth Chapter
  • 11 Voice Over Internet Protocol
  • Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications
  • Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.