Wireless security : models, threats, and solutions / Randall K. Nichols, Panos C. Lekkas.
Material type:
Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|---|
![]() |
Dr. S. R. Lasker Library, EWU E-book | Non-fiction | 621.384560058 NIW 2002 (Browse shelf(Opens below)) | Not for loan | ||||
![]() |
Dr. S. R. Lasker Library, EWU Reserve Section | Non-fiction | 621.384560058 NIW 2002 (Browse shelf(Opens below)) | C-1 | Not For Loan | 20894 | ||
![]() |
Dr. S. R. Lasker Library, EWU Circulation Section | Non-fiction | 621.384560058 NIW 2002 (Browse shelf(Opens below)) | C-2 | Available | 20895 |
Online version:
Nichols, Randall K.
Wireless security.
New York ; London : McGraw-Hill, c2002
(OCoLC)606603807
Includes bibliographical references and index.
TOC Chapter 1 Why is Wireless Different? --
Chapter 2 Wireless Information Warfare --
Chapter 3 Telephone System Vulnerabilities --
Chapter 4 Satellite Communications --
Chapter 5 Cryptographic Security --
Chapter 6 Speech Cryptology --
Chapter 7 The Wireless Local Area Network (WLAN) --
Chapter 8 Wireless Application Protocol (WAP) --
Chapter 9 Wireless Transport Layer Security (WTLS) --
Chapter 10 Bluetooth Chapter --
11 Voice Over Internet Protocol --
Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications --
Chapter 13 Optimizing Wireless Security with FPGAs and ASICs.
EEE ECE ETE
Saifun Momota
There are no comments on this title.