包郵 無線網(wǎng)絡(luò)安全-理論與應(yīng)用-(英文版)
-
>
全國計算機等級考試最新真考題庫模擬考場及詳解·二級MSOffice高級應(yīng)用
-
>
決戰(zhàn)行測5000題(言語理解與表達(dá))
-
>
軟件性能測試.分析與調(diào)優(yōu)實踐之路
-
>
第一行代碼Android
-
>
JAVA持續(xù)交付
-
>
EXCEL最強教科書(完全版)(全彩印刷)
-
>
深度學(xué)習(xí)
無線網(wǎng)絡(luò)安全-理論與應(yīng)用-(英文版) 版權(quán)信息
- ISBN:9787040366808
- 條形碼:9787040366808 ; 978-7-04-036680-8
- 裝幀:一般膠版紙
- 冊數(shù):暫無
- 重量:暫無
- 所屬分類:>>
無線網(wǎng)絡(luò)安全-理論與應(yīng)用-(英文版) 本書特色
陳磊、季家凰、張自洪編寫的《無線網(wǎng)絡(luò)安全-- 理論與應(yīng)用(英文版)/新一代信息科學(xué)與技術(shù)叢書》 是與springer合作出版的英文專著。 全書內(nèi)容包含了經(jīng)典及*新的無線網(wǎng)絡(luò)安全的算 法、機理和技術(shù),討論了無線網(wǎng)絡(luò)的安全問題,如 wlan、藍(lán)牙、衛(wèi)星、manet、傳感器網(wǎng)絡(luò)等。全書既 包含理論講述,也注重實踐技術(shù)應(yīng)用,同時反映了無 線網(wǎng)絡(luò)安全領(lǐng)域的新進展。 《無線網(wǎng)絡(luò)安全--理論與應(yīng)用(英文版)/新一代 信息科學(xué)與技術(shù)叢書》可供信息安全等學(xué)科從事研究 及應(yīng)用的科研人員使用,也可供高年級本科生及研究 生在學(xué)習(xí)相關(guān)課程時參考使用。
無線網(wǎng)絡(luò)安全-理論與應(yīng)用-(英文版) 內(nèi)容簡介
陳磊、季家凰、張自洪編寫的《無線網(wǎng)絡(luò)安全--理論與應(yīng)用(英文版)/新一代信息科學(xué)與技術(shù)叢書》是與springer合作出版的英文專著。內(nèi)容新穎,覆蓋全面,力求體現(xiàn)“理論+應(yīng)用+實踐”的特色。針對各種無線網(wǎng)絡(luò)技術(shù),先闡述原理,然后介紹應(yīng)用實例。《無線網(wǎng)絡(luò)安全--理論與應(yīng)用(英文版)/新一代信息科學(xué)與技術(shù)叢書》可供信息安全等學(xué)科從事研究及應(yīng)用的科研人員使用,也可供高年級本科生及研究生在學(xué)習(xí)相關(guān)課程時參考使用。
無線網(wǎng)絡(luò)安全-理論與應(yīng)用-(英文版) 目錄
chapter 1 applications, technologies, and standards insecure wireless networks and communications
lei chen
1.1 introduction
1.2 overview of security in cellularnetworks and communications
1.3 overview of security in wlans
1.4 overview of security in wmans
1.5 overview of security in bluetoothnetworks and communications
1.6 overview of security in vanets
1.7 overview of security in wsns
1.8 overview of security in wmns
1.9 overview of security in rfid networksand communications
1.10 summary
references
chapter 2 security in cellular networks andcommunications
chuan-kun wu
2.1 introduction
2.2 security architecture of cellularcommunication networks
2.3 security techniques in gsm networks
2.4 security techniques in 3g networks
2.5 security techniques in lte networks
2.6 security issues in femtocell
2.7 privacy issues in cellular networks
2.8 security issues of mobile devices
2.9 concluding remarks
references
chapter 3 security in wireless local area networks
chao yang and guofei gu
3.1 introduction to wlan
3.2 current state of wlan security
3.3 wlan communication security
3.4 wlan access point security
3.5 other wlan security issues
3.6 conclusion
references
chapter 4 security in wireless metropolitan areanetworks
lei chen, narasimha shashidhar, shengli yuan, and mingyang
4.1 introduction
4.2 fundamentals of wimax
4.3 wimax security goals and solutions
4.4 wimax security vulnerabilities, threats,and countermeasures
4.5 summary
references
chapter 5 security in bluetooth networks andcommunications
lei chen, peter cooper, and qingzhong liu
5.1 introduction
5.2 bluetooth primer
5.3 bluetooth security solutions
5.4 bluetooth security vulnerabilities,threats, and countermeasures
5.5 conclusion
references
chapter 6 security in vehicular ad hoc networks(vanets)
weidong yang
6.1 introduction
6.2 security architecture framework forvehicular ad hoc networks
6.3 secure communication protocols forvehicular ad hoc network
6.4 privacy enhancing and securepositioning
6.5 conclusion
references
chapter 7 security in wireless sensor networks
weiping wang, shigeng zhang, guihua duan, and hongsong
7.1 introduction
7.2 key management in wsns
7.3 secure routing protocols in wsns
7.4 location privacy protections in wsns
7.5 secure data aggregation
7.6 conclusion
references
chapter 8 security in wireless sensor networks
ping li, limin sun, xiangyan fu, and lin ning
8.1 introduction
8.2 overview of security architecture forwsn
8.3 cryptographic approaches
8.4 resilience on key management
8.5 trust management
8.6 location privacy
8.7 conclusion
references
chapter 9 security in wireless mesh networks
chung-wei lee
9.1 introduction
9.2 wireless mesh networks (wmn)characteristics
9.3 wmn security vulnerabilities
9.4 wmn defense mechanisms
9.5 wmn security standards and products
9.6 conclusion
references
chapter 10 security in rfid networks andcommunications
chiu c. tan and jie wu
10.1 introduction
10.2 rfid network primer
10.3 security requirements
10.4 hardware based solutions
10.5 basic protocol based solutions
10.6 advance protocol based solutions
10.7 commercial rfid security
10.8 conclusion
references
index
- >
中國人在烏蘇里邊疆區(qū):歷史與人類學(xué)概述
- >
巴金-再思錄
- >
大紅狗在馬戲團-大紅狗克里弗-助人
- >
伯納黛特,你要去哪(2021新版)
- >
月亮虎
- >
自卑與超越
- >
二體千字文
- >
我與地壇