Mobile communication systems and security
โ Scribed by Man Young Rhee
- Publisher
- John Wiley and Sons
- Year
- 2009
- Tongue
- English
- Leaves
- 477
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G systems and beyond, with an emphasis on wireless security aspects. By progressing in a systematic manner, presenting the theory and practice of wireless mobile technologies along with various security problems, readers will gain an intimate sense of how mobile systems operate and how to address complex security issues.Written by a top expert in information securityDetails each generation of cellular technologyGives a clear understanding of wireless security protocol analysisOffers complete coverage of various protocols and specifications in 3GPPsForecasts new features and promising technologiesPresents numerical examples in each chapter for easier understandingProvides source code that can be used for individual practiceThe book is ideal for advanced undergraduate and postgraduate students enrolled in courses such as Wireless Networking, Wireless Security, or Mobile Radio Communications. Practicing engineers in industry and research scientists can use the book as a reference to get reacquainted with mobile radio fundamentals or to gain deeper understanding of the security layer.Access the source code and lecture materials at the companion website: (www.wiley.com/go/rhee)
๐ SIMILAR VOLUMES
MobiSec 2010 was the second ICST conference on security and privacy in mobile information and communication systems. With the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between t
<P>The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels ? from subscriber to network operator to service provider. </P> <P></
Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system, discusses the demand to realize the service continuity in th
<p>Organized into three parts, Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications examines the inherent constraint of limited bandwidth and unreliable time-varying physical link in the wireless system, discusses the demand to realize the service continuity in