Wireless security : models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas.
Material type:
- 0071380388 (paperback)
- 9780071380386 (paperback)
Item type | Current library | Collection | Call number | Status | Notes | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
Air University's Aerospace and Aviation Campus Kamra | NFIC | 621.382 NIC (Browse shelf(Opens below)) | Available | Sent this item to AUPACK. ( Kamra Campus) | P7199 |
Browsing Air University Central Library Islamabad shelves Close shelf browser (Hides shelf browser)
![]() |
![]() |
No cover image available |
![]() |
![]() |
![]() |
![]() |
||
621.382 MOL Wireless communications | 621.382 MOL Wireless communications | 621.382 NEE Antennas for information super skyways : an exposition on outdoor and indoor wireless antennas | 621.382 NIC Wireless security : models, threats, and solutions / | 621.382 PAH Principles of wireless networks : a unified approach / | 621.382 PAN Mobile and personal communication services and systems / | 621.382 PRO Digital communications |
This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to: recognize new and established threats to wireless systems; close gaps that threaten privacy, profits, and customer loyalty; replace temporary, fragmented, and partial solutions with more robust and durable answers; prepare for the boom in m-business; weigh platforms against characteristic attacks and protections; apply clear guidelines for the best solutions now and going forward; and assess today's protocol options and compensate for documented shortcomings. It is a comprehensive guide to the states-of-the-art. It includes: encryption algorithms you can use now; end-to-end hardware solutions and field programmable gate arrays; speech cryptology; authentication strategies and security protocols for wireless systems; infosec and infowar experience; and adding satellites to your security mix.
There are no comments on this title.