In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the
Wireless Internet Security: Architecture and Protocols
โ Scribed by James Kempf
- Publisher
- Cambridge University Press
- Year
- 2008
- Tongue
- English
- Leaves
- 223
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems. Kempf also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, security threats, functional architecture, and the important internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.
๐ SIMILAR VOLUMES
Many organizations are transforming their businesses through the development of information and communications technologies. The security of this e-commerce is now a key enabler for businesses and this book presents an overview of current and future infrastructures for e-business including XML secur
This book collects articles featuring recent advances in the theory and applications of wireless mesh networking technology. The contributed articles, from the leading experts in the field, cover both theoretical concepts and system-level implementation issues. The book starts with the essential bac
Callaway writes for a hardware engineer, rather than a software person. He gives a history of various existing wireless networks, where these were not necessarily deployed with an aim for use with sensors. So we see the Aloha network that spans the Hawaiian islands. And how the dispersed nature of t