|
![]() |
|||
|
||||
OverviewThis book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking. Full Product DetailsAuthor: Aimo Torn , Yang Xiao , Xuemin Shen , Ding-Zhu DuPublisher: Springer Imprint: Springer Volume: 350 Dimensions: Width: 23.40cm , Height: 2.20cm , Length: 15.60cm Weight: 0.603kg ISBN: 9780387508719ISBN 10: 0387508716 Pages: 255 Publication Date: 01 January 1989 Audience: General/trade , General Format: Undefined Publisher's Status: Unknown Availability: Out of stock ![]() Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |