TY - BOOK AU - Nichols,Randall K. AU - Lekkas,Panos C. TI - Wireless security: models, threats, and solutions SN - 0071380388 (alk. paper) AV - TK5102.85 .N53 2002 U1 - 621.384560058 22 PY - 2002/// CY - New York, New Delhi PB - McGraw-Hill, Tata McGraw-Hill KW - Wireless communication systems KW - Security measures KW - Computer security N1 - Online version: Nichols, Randall K. Wireless security. New York ; London : McGraw-Hill, c2002 (OCoLC)606603807; Includes bibliographical references and index; TOC; Chapter 1 Why is Wireless Different? -- Chapter 2 Wireless Information Warfare -- Chapter 3 Telephone System Vulnerabilities -- Chapter 4 Satellite Communications -- Chapter 5 Cryptographic Security -- Chapter 6 Speech Cryptology -- Chapter 7 The Wireless Local Area Network (WLAN) -- Chapter 8 Wireless Application Protocol (WAP) -- Chapter 9 Wireless Transport Layer Security (WTLS) -- Chapter 10 Bluetooth Chapter -- 11 Voice Over Internet Protocol -- Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications -- Chapter 13 Optimizing Wireless Security with FPGAs and ASICs; EEE; ECE; ETE UR - https://www.worldcat.org/title/wireless-security-models-threats-and-solutions/oclc/47938816&referer=brief_results UR - http://lib.ewubd.edu/ebook/5612 ER -