Wireless security : models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas.
Material type: TextLanguage: English Series: McGraw-Hill telecom professionalPublication details: New York ; New Delhi : McGraw-Hill , Tata McGraw-Hill, c2002. Description: xliii, 657 p. : ill. ; 24 cmISBN: 0071380388 (alk. paper); 0070618844; 9780071380386Subject(s): Wireless communication systems -- Security measures | Computer securityDDC classification: 621.384560058 LOC classification: TK5102.85 | .N53 2002Online resources: WorldCat details | Ebook FulltextItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
E-Book | Dr. S. R. Lasker Library, EWU E-book | Non-fiction | 621.384560058 NIW 2002 (Browse shelf(Opens below)) | Not for loan | ||||
Text | Dr. S. R. Lasker Library, EWU Reserve Section | Non-fiction | 621.384560058 NIW 2002 (Browse shelf(Opens below)) | C-1 | Not For Loan | 20894 | ||
Text | Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 621.384560058 NIW 2002 (Browse shelf(Opens below)) | C-2 | Available | 20895 |
Online version:
Nichols, Randall K.
Wireless security.
New York ; London : McGraw-Hill, c2002
(OCoLC)606603807
Includes bibliographical references and index.
TOC Chapter 1 Why is Wireless Different? --
Chapter 2 Wireless Information Warfare --
Chapter 3 Telephone System Vulnerabilities --
Chapter 4 Satellite Communications --
Chapter 5 Cryptographic Security --
Chapter 6 Speech Cryptology --
Chapter 7 The Wireless Local Area Network (WLAN) --
Chapter 8 Wireless Application Protocol (WAP) --
Chapter 9 Wireless Transport Layer Security (WTLS) --
Chapter 10 Bluetooth Chapter --
11 Voice Over Internet Protocol --
Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications --
Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.
EEE ECE ETE
Saifun Momota
There are no comments on this title.