Jump quickly to results on these stores:
This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.
About: This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services.
About: This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services.
Pricing is shown for items sent to or within the U.S., excluding shipping and tax. Please consult the store to determine exact fees. No warranties are made express or implied about the accuracy, timeliness, merit, or value of the information provided. Information subject to change without notice. isbn.nu is not a bookseller, just an information source.