Wireless security : models, threats, and solutions /
Nichols and Lekkas uncover the threats and vunerablilities unique to the wireless communication, telecom, broadband, and satellite markets. They provide an overview of current commercial security solutions available on the open market.
Cote: | Libro Electrónico |
---|---|
Auteur principal: | |
Autres auteurs: | |
Format: | Électronique eBook |
Langue: | Inglés |
Publié: |
New York, N.Y. :
McGraw-Hill Education,
[2002]
|
Édition: | First edition. |
Collection: | McGraw-Hill's AccessEngineering.
|
Sujets: | |
Accès en ligne: | Texto completo |
Table des matières:
- Chapter 1 Why is Wireless Different?
- Chapter 2 Wireless Information Warfare
- Chapter 3 Telephone System Vulnerabilities
- Chapter 4 Satellite Communications
- Chapter 5 Cryptographic Security
- Chapter 6 Speech Cryptology
- Chapter 7 The Wireless Local Area Network (WLAN)
- Chapter 8 Wireless Application Protocol (WAP)
- Chapter 9 Wireless Transport Layer Security (WTLS)
- Chapter 10 Bluetooth Chapter
- 11 Voice Over Internet Protocol
- Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications
- Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.