Wireless Security: Model, threats, and solutions
This book uncovers the threats and vunerablilities unique to wireless communication and other solutions for telecom, broadband, satellite, and other emerging markets. It also helps you plan application-aware cryptographic tactics, plot your realistic defenses, and review the commercial solutions currently on the market.
2002
This book uncovers the threats and vunerablilities unique to wireless communication and other solutions for telecom, broadband, satellite, and other emerging markets. It also helps you plan application-aware cryptographic tactics, plot your realistic defenses, and review the commercial solutions currently on the market.
The content of the book includes 13 sections:
+ Section 1: Why is Wireless Different?
+ Section 2: Wireless Information Warfare
+ Section 3: Telephone System Vulnerabilities
+ Section 4: Satellite Communications
+ Section 5: Cryptographic Security
+ Section 6: Speech Cryptology
+ Section 7: The Wireless Local Area Network (WLAN)
+ Section 8: Wireless Application Protocol (WAP)
+ Section 9: Wireless Transport Layer Security (WTLS)
+ Section 10: Bluetooth
+ Section 11: Voice Over Internet Protocol
+ Section 12: Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications
+ Section 13: Optimizing Wireless Security with FPGAs and ASICs
Randall K. Nichols; Panos C. Lekkas. Wireless Security: Model, threats, and solutions. Mc Graw Hill, 2002.
Ngành CÔNG NGHỆ KỸ THUẬT ĐIỆN TỬ, VIỄN THÔNG (7510302)
Wireless Security: Model, threats, and solutions | Wireless communications: Principles and practice (second edition) | MATLAB® for Engineers (5th edition) |
Thứ Ba, 13:30 26/04/2022
Copyright © 2018 Hanoi University of Industry.