WIRELESS SECURITY models, threats, and solutions
This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Book |
Language: | English |
Published: |
Boston
McGraw Hill
2002
©2002 |
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam#a2200000#i#4501 | ||
---|---|---|---|
001 | wils-290690 | ||
005 | 202029113859 | ||
008 | 200309 2002 000 eng#D | ||
020 | 0 | 0 | |a 0071380388 |q paperback |
020 | 0 | 0 | |a 9780071380386 |q paperback |
040 | # | # | |a UKM |d UiTM |e rda |
041 | 0 | # | |a eng |
090 | 0 | 0 | |a TK5102.85 |b .N53 2002 |
100 | 1 | 0 | |a Nichols, Randall K |e author |
245 | 1 | 0 | |a WIRELESS SECURITY |b models, threats, and solutions |c Randall K. Nichols, Panos C. Lekkas |
264 | # | 1 | |a Boston |b McGraw Hill |c 2002 |
264 | # | 1 | |c ©2002 |
300 | 0 | 0 | |a xliii, 657 pages |b illustrations |c 24 cm |
336 | # | # | |a text |2 rdacontent |
337 | # | # | |a unmediated |2 rdamedia |
338 | # | # | |2 rdacarrier rdacarrier rdacarrier |
504 | 0 | 0 | |a Includes bibliographical references and index |
520 | # | # | |a This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to: recognize new and established threats to wireless systems; close gaps that threaten privacy, profits, and customer loyalty; replace temporary, fragmented, and partial solutions with more robust and durable answers; prepare for the boom in m-business; weigh platforms against characteristic attacks and protections; apply clear guidelines for the best solutions now and going forward; and assess today's protocol options and compensate for documented shortcomings. It is a comprehensive guide to the states-of-the-art. It includes: encryption algorithms you can use now; end-to-end hardware solutions and field programmable gate arrays; speech cryptology; authentication strategies and security protocols for wireless systems; infosec and infowar experience; and adding satellites to your security mix. |
650 | # | 0 | |a Computer security |
650 | # | 0 | |a Wireless communication systems |x Security measures |
700 | 1 | 1 | |a Lekkas, Panos C. |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=290690 |
964 | # | # | |c BOK |c BOK |d 01 |d 01 |
998 | # | # | |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00520##a007.2||00520##b007.2|| |