menu 简单麦麦
account_circle

无线安全:模型、威胁和解决方案-Wireless security: models, threats, and solutions

帮助2571人找到了他们想要的文件
上传于 2020-03-02 49次下载 2798次围观
文件编号:5033
文件详情
标题(title):Wireless security: models, threats, and solutions
无线安全:模型、威胁和解决方案
作者(author):Nichols, Randall K.; Lekkas, Panos C
出版社(publisher):McGraw-Hill
大小(size):5 MB (4720912 bytes)
格式(extension):pdf
注意:如果文件下载完成后为无法打开的格式,请修改后缀名为格式对应后缀

Annotation
REAL-WORLD WIRELESS SECURITY This comprehensive guide catalogs and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to--
* Recognize new and established threats to wireless systems
* Close gaps that threaten privary, profits, and customer loyalty
* Replace temporary, fragmented, and partial solutions with more robust and durable answers
* Prepare for the boom in m-business
* Weigh platforms against characteristic attacks and protections
* Apply clear guidelines for the best solutions now and going forward
* Assess today's protocol options and compensate for documented shortcomings A COMPREHENSIVE GUIDE TO THE STATE OF THE ART
* Encryption algorithms you can use now
* End-to-end hardware solutions and field programmable gate arrays
* Speech cryptology
* Authentication strategies and security protocols for wireless systems
* Infosec and infowar experience
* Adding satellites to your security mix.  Read more...
Abstract: The first complete guide to wireless security for the enterprise.  Read more...
Table of contents :
Content: Why is wireless different? --
Wireless information warfare --
Telephone system vulnerabilities --
Satellite communications --
Cryptographic security --
Speech cryptology --
The wireless local area network (WLAN) --
Wireless application protocol (WAP) --
Wireless transport layer Security (WTLS) --
Bluetooth chapter --
Voice over Internet protocol --
Hardware perspectives for end-to-end security (E2E) in wireless applications --
Optimizing wireless security with FPGAs and ASICs.
-到底部了哦-
微信扫码支付
无线安全:模型、威胁和解决方案-Wireless security: models, threats, and solutions
支付金额: 共计:¥0.0

添加收藏

创建新合集