Wireless security: models, threats, and solutions
β Scribed by Nichols, Randall K.; Lekkas, Panos C
- Publisher
- McGraw-Hill
- Year
- 2002
- Tongue
- English
- Leaves
- 703
- Series
- McGraw-Hill telecom professional
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Annotation Β Read more...
Abstract:
β¦ Table of Contents
Content: Why is wireless different? --
Wireless information warfare --
Telephone system vulnerabilities --
Satellite communications --
Cryptographic security --
Speech cryptology --
The wireless local area network (WLAN) --
Wireless application protocol (WAP) --
Wireless transport layer Security (WTLS) --
Bluetooth chapter --
Voice over Internet protocol --
Hardware perspectives for end-to-end security (E2E) in wireless applications --
Optimizing wireless security with FPGAs and ASICs.
β¦ Subjects
Wireless communication systems;Security measures;Computer security;Transmission sans fil;SeΜcuriteΜ;Mesures;SeΜcuriteΜ informatique;COMPUTERS;Internet;Security;COMPUTERS;Networking;Security;COMPUTERS;Security;General
π SIMILAR VOLUMES
This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read
This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read
Annotation<span class='showMoreLessContentElement' style='display: none;'><p>REAL-WORLD WIRELESS SECURITY This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabi
This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications.