Welcome to Air University Central Library and Fazaia Medical College Library. (Sign in with Your email. Your user name is the same as your student ID number or Employee ID number for password, please contact Circulation Staff)

Wireless security : (Record no. 25583)

MARC details
000 -LEADER
fixed length control field 01809nam a2200193 a 4500
001 - CONTROL NUMBER
control field ASIN0071380388
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200825143808.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120227s2001 xxu eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0071380388 (paperback)
Terms of availability $65.00
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780071380386 (paperback)
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Nichols, Randall K.
245 10 - TITLE STATEMENT
Title Wireless security :
Remainder of title models, threats, and solutions /
Statement of responsibility, etc. Randall K. Nichols, Panos C. Lekkas.
250 ## - EDITION STATEMENT
Edition statement 1st ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. [S.l.] :
Name of publisher, distributor, etc. McGraw-Hill Professional,
Date of publication, distribution, etc. 2001.
300 ## - PHYSICAL DESCRIPTION
Extent 657 p. ;
Dimensions 24 cm.
520 ## - SUMMARY, ETC.
Summary, etc. This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to: recognize new and established threats to wireless systems; close gaps that threaten privacy, profits, and customer loyalty; replace temporary, fragmented, and partial solutions with more robust and durable answers; prepare for the boom in m-business; weigh platforms against characteristic attacks and protections; apply clear guidelines for the best solutions now and going forward; and assess today's protocol options and compensate for documented shortcomings. It is a comprehensive guide to the states-of-the-art. It includes: encryption algorithms you can use now; end-to-end hardware solutions and field programmable gate arrays; speech cryptology; authentication strategies and security protocols for wireless systems; infosec and infowar experience; and adding satellites to your security mix.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Lekkas, Panos C.
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Amazon.com
Uniform Resource Identifier <a href="http://www.amazon.com/exec/obidos/ASIN/0071380388/chopaconline-20">http://www.amazon.com/exec/obidos/ASIN/0071380388/chopaconline-20</a>
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
    Dewey Decimal Classification       Air University Central Library Islamabad Air University's Aerospace and Aviation Campus Kamra   02/26/2012   621.382 NIC P7199 02/26/2012 02/26/2012 Book Sent this item to AUPACK. ( Kamra Campus)
Air University Sector E-9, Islamabad Paksitan
Email: librarian@au.edu.pk  Tel : +0092 51 9262612 Ext: 631