Dr. S. R. Lasker Library Online Catalogue

Home      Library Home      Institutional Repository      E-Resources      MyAthens      EWU Home

Amazon cover image
Image from Amazon.com

Wireless security : models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas.

By: Nichols, Randall KContributor(s): Lekkas, Panos CMaterial type: TextTextLanguage: English Series: McGraw-Hill telecom professionalPublication details: New York ; New Delhi : McGraw-Hill , Tata McGraw-Hill, c2002. Description: xliii, 657 p. : ill. ; 24 cmISBN: 0071380388 (alk. paper); 0070618844; 9780071380386Subject(s): Wireless communication systems -- Security measures | Computer securityDDC classification: 621.384560058 LOC classification: TK5102.85 | .N53 2002Online resources: WorldCat details | Ebook Fulltext
Contents:
TOC Chapter 1 Why is Wireless Different? -- Chapter 2 Wireless Information Warfare -- Chapter 3 Telephone System Vulnerabilities -- Chapter 4 Satellite Communications -- Chapter 5 Cryptographic Security -- Chapter 6 Speech Cryptology -- Chapter 7 The Wireless Local Area Network (WLAN) -- Chapter 8 Wireless Application Protocol (WAP) -- Chapter 9 Wireless Transport Layer Security (WTLS) -- Chapter 10 Bluetooth Chapter -- 11 Voice Over Internet Protocol -- Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications -- Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode Item holds
E-Book E-Book Dr. S. R. Lasker Library, EWU
E-book
Non-fiction 621.384560058 NIW 2002 (Browse shelf(Opens below)) Not for loan
Text Text Dr. S. R. Lasker Library, EWU
Reserve Section
Non-fiction 621.384560058 NIW 2002 (Browse shelf(Opens below)) C-1 Not For Loan 20894
Text Text Dr. S. R. Lasker Library, EWU
Circulation Section
Non-fiction 621.384560058 NIW 2002 (Browse shelf(Opens below)) C-2 Available 20895
Total holds: 0

Online version:
Nichols, Randall K.
Wireless security.
New York ; London : McGraw-Hill, c2002
(OCoLC)606603807

Includes bibliographical references and index.

TOC Chapter 1 Why is Wireless Different? --
Chapter 2 Wireless Information Warfare --
Chapter 3 Telephone System Vulnerabilities --
Chapter 4 Satellite Communications --
Chapter 5 Cryptographic Security --
Chapter 6 Speech Cryptology --
Chapter 7 The Wireless Local Area Network (WLAN) --
Chapter 8 Wireless Application Protocol (WAP) --
Chapter 9 Wireless Transport Layer Security (WTLS) --
Chapter 10 Bluetooth Chapter --
11 Voice Over Internet Protocol --
Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications --
Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.

EEE ECE ETE

Saifun Momota

There are no comments on this title.

to post a comment.