![](images/graphics/blank.gif)
Wireless security handbook
-
Ebook Handbook of research on wireless security Part 1 includes contents: Malicious software in mobile devices, Secure service discovery, Security of mobile code, Identity management, Wireless wardriving, Intrusion and anomaly detection in wireless networks, Peer-to-peer (P2P) network security: firewall issues, Identity management for wireless service access, Privacy enhancing techniques: a survey and classification, Vulnerability analysis and defenses in wireless networks,…
448p
haojiubujain06
05-09-2023
11
4
Download
-
Ebook Handbook of research on wireless security Part 2 includes contents: Security in mobile ad hoc networks, Privacy and anonymity in mobile ad hoc networks, Secure routing with reputation in MANET, Trust management and context-driven access control, A survey of key management in mobile ad hoc networks, Security measures for mobile ad-hoc networks (MANETs), A novel secure video surveillance system over wireless ad-hoc networks,…
413p
haojiubujain06
05-09-2023
8
4
Download
-
Ebook Wireless security handbook: Part 1 includes contents: Chapter 1 wireless network overview, chapter 2 risks and threats of wireless, chapter 3 the legality of computer crime, chapter 4 wireless physical layer technologies, chapter 5 wireless management frames, chapter 6 wireless local and personal area networks, chapter 7 wide area wireless technologies, chapter 8 wireless antenna theory.
138p
haojiubujain06
06-09-2023
8
4
Download
-
Ebook Wireless security handbook: Part 2 includes contents: Chapter 9 the wireless deployment process, chapter 10 wireless access points, chapter 11 wireless end devices, chapter 12 wireless lan security, chapter 13 breaking wireless security, chapter 14 wireless security policy, chapter 15 wireless security architectures, chapter 16 wireless tools, appendix a review question answers.
215p
haojiubujain06
06-09-2023
8
3
Download
-
"Internetworking technology Handbook" present creating a pdf of the internetworking technology; LAN technologies; internetworking basics; bridging and switching; network management; wireless technologies; security technologies; network caching technologies; IBM network management...
597p
lehoangdung2021
12-05-2021
561
515
Download
-
(BQ) The Handbook of information and communication security covers some of the latest advances in fundamentals, cryptography, intrusion detection, access control, networking (including extensive sections on optics and wireless systems), software, forensics, and legal issues. The editors intention, with respect to the presentation and sequencing of the chapters, was to create a reasonably natural flow between the various sub-topics. The book is divided into 2 parts, part 1 from chapter 1 to chapter 20.
409p
tangtuy07
08-04-2016
62
6
Download
-
Tham khảo sách 'bad data handbook', công nghệ thông tin, kỹ thuật lập trình phục vụ nhu cầu học tập, nghiên cứu và làm việc hiệu quả
264p
hotmoingay3
09-01-2013
46
2
Download
-
Ultra wideband (UWB) communication systems are characterized by high data rates, low cost, multipath immunity, and low power transmission. They are widely used in wireless communications, networking, radar, imaging, and positioning systems. In 2002, the Federal Communication Commission (FCC) legalized low power UWB emission between 3.1 GHz and 10.6 GHz for indoor communication devices stimulating many novel UWB applications such as personal area networks (PANs), accurate tracking and location, safety and homeland security....
0p
ktcn_1
10-07-2012
84
6
Download
-
Wireless cellular networks are an integral part of modern telecommunication systems. Today it is hard to imagine our life without the use of such networks. Nevertheless, the development, implementation and operation of these networks require engineers and scientists to address a number of interrelated problems.
0p
ktcn_1
10-07-2012
52
4
Download
-
Radio Frequency Identifi cation (RFID) is a modern wireless data transmission and reception technique for applications including automatic identifi cation, asset tracking and security surveillance. As barcodes and other means of identifi cation and asset tracking are inadequate for recent demands, RFID technology has att racted interest for applications such as logistics, supply chain management, asset tracking, and security access control.
294p
ktcn_1
10-07-2012
68
9
Download
-
This book “Communications and Networking” focuses on the issues at the lowest two layers of communications and networking and provides recent research results on some of these issues. In particular, it fi rst introduces recent research results on many important issues at the physical layer and data link layer of communications and networking and then briefl y shows some results on some other important topics such as security and the application of wireless networks.
0p
123859674
04-07-2012
62
5
Download
-
The expansion and popularity of the Internet, along with the addition of wireless data functionality to wireless networks, has also contributed greatly to the growth of the wireless industry. In fact, the anticipated consumer demand for high bandwidth wireless data is commonly seen as the driving force behind current network upgrades and expansions. The number and types of companies aggressively investing in wireless technologies illustrate the importance of wireless data.
234p
ken333
14-06-2012
103
29
Download
-
This book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this book, the reader will see that it tackles the risk of wireless from many angles. It goes from a policy level to mitigate certain risks that wireless brings. It talks about the most cost-effective solutions to deploy wireless across a large enterprise.
353p
daokim
04-08-2009
304
141
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)