Wireless security : (Record no. 25583)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01809nam a2200193 a 4500 |
001 - CONTROL NUMBER | |
control field | ASIN0071380388 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20200825143808.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 120227s2001 xxu eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0071380388 (paperback) |
Terms of availability | $65.00 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780071380386 (paperback) |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Nichols, Randall K. |
245 10 - TITLE STATEMENT | |
Title | Wireless security : |
Remainder of title | models, threats, and solutions / |
Statement of responsibility, etc. | Randall K. Nichols, Panos C. Lekkas. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | [S.l.] : |
Name of publisher, distributor, etc. | McGraw-Hill Professional, |
Date of publication, distribution, etc. | 2001. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 657 p. ; |
Dimensions | 24 cm. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to: recognize new and established threats to wireless systems; close gaps that threaten privacy, profits, and customer loyalty; replace temporary, fragmented, and partial solutions with more robust and durable answers; prepare for the boom in m-business; weigh platforms against characteristic attacks and protections; apply clear guidelines for the best solutions now and going forward; and assess today's protocol options and compensate for documented shortcomings. It is a comprehensive guide to the states-of-the-art. It includes: encryption algorithms you can use now; end-to-end hardware solutions and field programmable gate arrays; speech cryptology; authentication strategies and security protocols for wireless systems; infosec and infowar experience; and adding satellites to your security mix. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Lekkas, Panos C. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Materials specified | Amazon.com |
Uniform Resource Identifier | <a href="http://www.amazon.com/exec/obidos/ASIN/0071380388/chopaconline-20">http://www.amazon.com/exec/obidos/ASIN/0071380388/chopaconline-20</a> |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection code | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Full call number | Barcode | Date last seen | Price effective from | Koha item type | Public note |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Air University Central Library Islamabad | Air University's Aerospace and Aviation Campus Kamra | 02/26/2012 | 621.382 NIC | P7199 | 02/26/2012 | 02/26/2012 | Book | Sent this item to AUPACK. ( Kamra Campus) |