Wireless security essentials : Defending mobile systems from data piracy / Russell Dean Vines.

By: Vines, Russell DeanCall number: 005.821 V782W 2002 Material type: BookBookPublisher: Indiana : Wiley Publishing, 2002Description: 345 p. : ill, table ; 23 cmISBN: 0471209368 :Subject(s): Wireless communication systems -- Security measures | Mobile communication systems -- Security measuresDDC classification: 005.821 V782W 2002
Partial contents:
Pt. I Technology Essentials -- Ch. 1 Computing Technology -- Ch. 2 Wireless Theory -- Ch. 3 Wireless Reality -- Pt. II Security Essentials -- Ch. 4 Security Concepts and Methodologies -- Ch. 5 Security Technologies -- Ch. 6 Threats and Solutions -- App. A: Glossary -- App. B A WLAN Exploitation Guide -- App. C Using the Fluhrer, Mantin, and Shamir Attack to Break WEP -- App. D NASA White Paper on the Wireless Firewall -- Gateway -- App. E: Referenced Documents and URLs
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
General Books General Books สำนักวิทยบริการ (Center)
ชั้น 7 หนังสือทั่วไปภาษาอังกฤษ 000-900
005.821 V782W 2002 (Browse shelf(Opens below)) 1 Available 2000052171
Browsing สำนักวิทยบริการ (Center) shelves, Shelving location: ชั้น 7 หนังสือทั่วไปภาษาอังกฤษ 000-900 Close shelf browser (Hides shelf browser)
005.82 J17E 2011 Engineering information security : 005.82 S376I 2007 Information assurance for the enterprise : 005.82 S782C 2011 Cryptography and Network Security : 005.821 V782W 2002 Wireless security essentials : 006 L668C 1994 Create your own virtual reality system / 006.3 A261S 2016 Statistical methods for recommender systems / 006.3 B592 2016 Big data fundamentals :

Includes bibliographical references (p. 321-336) and index

Pt. I Technology Essentials -- Ch. 1 Computing Technology -- Ch. 2 Wireless Theory -- Ch. 3 Wireless Reality -- Pt. II Security Essentials -- Ch. 4 Security Concepts and Methodologies -- Ch. 5 Security Technologies -- Ch. 6 Threats and Solutions -- App. A: Glossary -- App. B A WLAN Exploitation Guide -- App. C Using the Fluhrer, Mantin, and Shamir Attack to Break WEP -- App. D NASA White Paper on the Wireless Firewall -- Gateway -- App. E: Referenced Documents and URLs

There are no comments on this title.

to post a comment.