WIRELESS SECURITY models, threats, and solutions

This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read...

Full description

Saved in:
Bibliographic Details
Main Author: Nichols, Randall K (Author)
Other Authors: Lekkas, Panos C.
Format: Book
Language:English
Published: Boston McGraw Hill 2002
©2002
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam#a2200000#i#4501
001 wils-290690
005 202029113859
008 200309 2002 000 eng#D
020 0 0 |a 0071380388  |q paperback 
020 0 0 |a 9780071380386  |q paperback 
040 # # |a UKM  |d UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a TK5102.85  |b .N53 2002 
100 1 0 |a Nichols, Randall K  |e author 
245 1 0 |a WIRELESS SECURITY  |b models, threats, and solutions  |c Randall K. Nichols, Panos C. Lekkas 
264 # 1 |a Boston  |b McGraw Hill  |c 2002 
264 # 1 |c ©2002 
300 0 0 |a xliii, 657 pages  |b illustrations  |c 24 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |2 rdacarrier rdacarrier rdacarrier 
504 0 0 |a Includes bibliographical references and index 
520 # # |a This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to: recognize new and established threats to wireless systems; close gaps that threaten privacy, profits, and customer loyalty; replace temporary, fragmented, and partial solutions with more robust and durable answers; prepare for the boom in m-business; weigh platforms against characteristic attacks and protections; apply clear guidelines for the best solutions now and going forward; and assess today's protocol options and compensate for documented shortcomings. It is a comprehensive guide to the states-of-the-art. It includes: encryption algorithms you can use now; end-to-end hardware solutions and field programmable gate arrays; speech cryptology; authentication strategies and security protocols for wireless systems; infosec and infowar experience; and adding satellites to your security mix. 
650 # 0 |a Computer security 
650 # 0 |a Wireless communication systems  |x Security measures 
700 1 1 |a Lekkas, Panos C. 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=290690 
964 # # |c BOK  |c BOK  |d 01  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||01264#1a002.8.2||01264#1b002.8.4||00520##a007.2||00520##b007.2||