Normal view MARC view ISBD view

Wireless security : models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas.

By: Nichols, Randall K.
Contributor(s): Lekkas, Panos C.
Material type: TextTextSeries: McGraw-Hill telecom professional. Publisher: New York ; New Delhi : McGraw-Hill , Tata McGraw-Hill, c2002Description: xliii, 657 p. : ill. ; 24 cm.ISBN: 0071380388 (alk. paper); 0070618844; 9780071380386.Subject(s): Wireless communication systems -- Security measures | Computer securityDDC classification: 621.384560058 Online resources: WorldCat details | Ebook Fulltext
Contents:
Table of contents Chapter 1 Why is Wireless Different? -- Chapter 2 Wireless Information Warfare -- Chapter 3 Telephone System Vulnerabilities -- Chapter 4 Satellite Communications -- Chapter 5 Cryptographic Security -- Chapter 6 Speech Cryptology -- Chapter 7 The Wireless Local Area Network (WLAN) -- Chapter 8 Wireless Application Protocol (WAP) -- Chapter 9 Wireless Transport Layer Security (WTLS) -- Chapter 10 Bluetooth Chapter -- 11 Voice Over Internet Protocol -- Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications -- Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Copy number Status Date due Barcode Item holds
E-Book E-Book EWU Library
E-book
Non-fiction 621.384560058 NIW 2002 (Browse shelf) Not for loan
Text Text EWU Library
Reserve Section
Non-fiction 621.384560058 NIW 2002 (Browse shelf) C-1 Not For Loan 20894
Text Text EWU Library
Circulation Section
Non-fiction 621.384560058 NIW 2002 (Browse shelf) C-2 Checked out 28/08/2019 20895
Total holds: 0

Online version:
Nichols, Randall K.
Wireless security.
New York ; London : McGraw-Hill, c2002
(OCoLC)606603807

Includes bibliographical references and index.

Table of contents Chapter 1 Why is Wireless Different? --
Chapter 2 Wireless Information Warfare --
Chapter 3 Telephone System Vulnerabilities --
Chapter 4 Satellite Communications --
Chapter 5 Cryptographic Security --
Chapter 6 Speech Cryptology --
Chapter 7 The Wireless Local Area Network (WLAN) --
Chapter 8 Wireless Application Protocol (WAP) --
Chapter 9 Wireless Transport Layer Security (WTLS) --
Chapter 10 Bluetooth Chapter --
11 Voice Over Internet Protocol --
Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications --
Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.

Electrical & Electronic Engineering Electronics & Communications Engineering Electronic & Telecommunication Engineering

There are no comments for this item.

Log in to your account to post a comment.

Library Home | Contacts | E-journals
Copyright @ 2011-2019 EWU Library
East West University