Wireless Security: Models, Threats, and Solutions
Randall Nichols
- 出版商: Tata Mcgraw Hill
- 出版日期: 2001-12-30
- 售價: $1,250
- 貴賓價: 9.8 折 $1,225
- 語言: 英文
- 頁數: 560
- 裝訂: Paperback
- ISBN: 0071207074
- ISBN-13: 9780071207072
-
相關分類:
資訊安全
下單後立即進貨 (約5~7天)
買這商品的人也買了...
-
$1,120$1,098Computer Algorithms C++
-
$1,200$1,176Computer Organization & Design: The Hardware/Software Interface, 2/e
-
$1,100$1,045Developing Windows NT Device Drivers: A Programmer's Handbook
-
$1,090$1,068Software Engineering, 6/e
-
$1,300$1,274Introduction to Automata Theory, Languages, and Computation, 2/e(精裝本)
-
$650$553SQL Server 2000 設計實務
-
$1,050$1,029Fundamentals of Logic Design, 4/e
-
$1,150$1,127Digital Image Processing, 2/e(IE)(美國版ISBN:0201180758)
-
$1,300$1,235Computer Architecture: A Quantitative Approach, 3/e(精裝本)
-
$1,741$1,654Understanding the Linux Kernel, 2/e (Paperback)
-
$650$553Red Hat Linux 9 實務應用
-
$580$493Dreamweaver MX 互動網站百寶箱 for ASP
-
$590$502ASP.NET 程式設計徹底研究
-
$600$540ARM 原理與實作─以網路 SoC 為例
-
$720$562深入淺出 JBuilder 程式設計實作(JBuilder 9.0/8.0/7.0 適用) (Charlie Calvert's Learn Jbuilder)
-
$780$624Java 2 教學手冊 SDK 1.4版 (Beginning Java 2 SDK 1.4 Edition)
-
$720$576重構─改善既有程式的設計
-
$290$247行動 Linux─KNOPPIX 改造手冊
-
$980$960System Software: An Introduction to Systems Programming, 3/e (IE-Paperback)
-
$990
CCNA Certification Library (CCNA Self-Study, exam #640-801), 6/e
-
$750$638鳥哥的 Linux 私房菜-伺服器架設篇
-
$450$360Linux 防火牆:iptables
-
$720$576手機、PDA 程式設計入門─Java 手機、Pocket PC、Palm OS、Symbian OS 程式設計
-
$620$527Visual C++ 開發手札 (CodeGuru.com Visual C++ Goodies)
-
$780$663CCNA 認證教戰手冊 Exam 640-801 (CCNA Cisco Certified Network Associate Study Guide, 4/e)
商品描述
This comprehensive guide catalogues and explains the full range of the security challenges involved in wireless communications. Experts Randall K. Nichols and Panos C. Lekkas lay out the vulnerabilities, response options, and real-world costs connected with wireless platforms and applications. Read this book to develop the background and skills to: recognize new and established threats to wireless systems; close gaps that threaten privacy, profits, and customer loyalty; replace temporary, fragmented, and partial solutions with more robust and durable answers; prepare for the boom in m-business; weigh platforms against characteristic attacks and protections; apply clear guidelines for the best solutions now and going forward; and assess today's protocol options and compensate for documented shortcomings. It is a comprehensive guide to the states-of-the-art. It includes: encryption algorithms you can use now; end-to-end hardware solutions and field programmable gate arrays; speech cryptology; authentication strategies and security protocols for wireless systems; infosec and infowar experience; and adding satellites to your security mix.