𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Wireless security: models, threats, and solutions

✍ Scribed by Nichols, Randall K.; Lekkas, Panos C


Publisher
McGraw-Hill
Year
2002
Tongue
English
Leaves
703
Series
McGraw-Hill telecom professional
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Annotation

REAL-WORLD WIRELESS SECURITY This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to--
Recognize new and established threats to wireless systems
Close gaps that threaten privary, profits, and customer loyalty
Replace temporary, fragmented, and partial solutions with more robust and durable answers
Prepare for the boom in m-business
Weigh platforms against characteristic attacks and protections
Apply clear guidelines for the best solutions now and going forward
Assess today's protocol options and compensate for documented shortcomings A COMPREHENSIVE GUIDE TO THE STATE OF THE ART
Encryption algorithms you can use now
End-to-end hardware solutions and field programmable gate arrays
Speech cryptology
Authentication strategies and security protocols for wireless systems
Infosec and infowar experience
* Adding satellites to your security mix. Β Read more...


Abstract:
The first complete guide to wireless security for the enterprise. Β Read more...

✦ Table of Contents


Content: Why is wireless different? --
Wireless information warfare --
Telephone system vulnerabilities --
Satellite communications --
Cryptographic security --
Speech cryptology --
The wireless local area network (WLAN) --
Wireless application protocol (WAP) --
Wireless transport layer Security (WTLS) --
Bluetooth chapter --
Voice over Internet protocol --
Hardware perspectives for end-to-end security (E2E) in wireless applications --
Optimizing wireless security with FPGAs and ASICs.

✦ Subjects


Wireless communication systems;Security measures;Computer security;Transmission sans fil;Sécurité;Mesures;Sécurité informatique;COMPUTERS;Internet;Security;COMPUTERS;Networking;Security;COMPUTERS;Security;General


πŸ“œ SIMILAR VOLUMES


Wireless Security: Models, Threats, and
✍ Randall K. Nichols, Panos C. Lekkas πŸ“‚ Library πŸ“… 2001 πŸ› McGraw-Hill Professional 🌐 English

This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read

Wireless Security: Models, Threats, and
✍ Randall K. Nichols, Panos C. Lekkas πŸ“‚ Library πŸ“… 2001 πŸ› McGraw-Hill Professional 🌐 English

This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read

Wireless security: models, threats, and
✍ Nichols, Randall K.; Lekkas, Panos C πŸ“‚ Library πŸ“… 2002 πŸ› McGraw-Hill 🌐 English

Annotation<span class='showMoreLessContentElement' style='display: none;'><p>REAL-WORLD WIRELESS SECURITY This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabi

Wireless security models, threats, and s
✍ Panos C. Lekkas, Randall K. Nichols πŸ“‚ Library πŸ“… 2001 πŸ› McGraw-Hill Professional 🌐 English

This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications.