Security for multihop wireless networks:
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks,...
Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press, Taylor & Francis Group
[2014]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781466578043/?ar |
Zusammenfassung: | Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. |
Beschreibung: | Includes bibliographical references and index. - Online resource; title from PDF title page (CRCnetBASE, viewed on May 23, 2014) |
Umfang: | 1 Online-Ressource (xiv, 524 Seiten) illustrations |
ISBN: | 9781466578043 1466578041 1306567904 9781306567909 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-058898115 | ||
003 | DE-627-1 | ||
005 | 20240228115528.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201021s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781466578043 |c eBook |9 978-1-4665-7804-3 | ||
020 | |a 1466578041 |c eBook |9 1-4665-7804-1 | ||
020 | |a 1306567904 |c ebk |9 1-306-56790-4 | ||
020 | |a 9781306567909 |c ebk |9 978-1-306-56790-9 | ||
035 | |a (DE-627-1)058898115 | ||
035 | |a (DE-599)KEP058898115 | ||
035 | |a (ORHE)9781466578043 | ||
035 | |a (DE-627-1)058898115 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a TEC |2 bisacsh | |
082 | 0 | |a 621.382 |2 23 | |
245 | 1 | 0 | |a Security for multihop wireless networks |c [edited by] Shafiullah Khan and Jaime Lloret Mauri |
264 | 1 | |a Boca Raton |b CRC Press, Taylor & Francis Group |c [2014] | |
264 | 4 | |c ©20 | |
264 | 4 | |c ©2014 | |
300 | |a 1 Online-Ressource (xiv, 524 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Online resource; title from PDF title page (CRCnetBASE, viewed on May 23, 2014) | ||
520 | |a Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. | ||
650 | 0 | |a Wireless communication systems |x Security measures | |
650 | 0 | |a Ad hoc networks (Computer networks) |x Security measures | |
650 | 0 | |a Wireless sensor networks |x Security measures | |
650 | 4 | |a Transmission sans fil ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux ad hoc (Réseaux d'ordinateurs) ; Sécurité ; Mesures | |
650 | 4 | |a Réseaux de capteurs sans fil ; Sécurité ; Mesures | |
650 | 4 | |a TECHNOLOGY & ENGINEERING ; Mechanical | |
650 | 4 | |a Wireless communication systems ; Security measures | |
700 | 1 | |a Khan, Shafiullah |e HerausgeberIn |4 edt | |
700 | 1 | |a Lloret Mauri, Jaime |e HerausgeberIn |4 edt | |
776 | 1 | |z 9781466578043 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781466578043 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781466578043/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-058898115 |
---|---|
_version_ | 1821494836691206144 |
adam_text | |
any_adam_object | |
author2 | Khan, Shafiullah Lloret Mauri, Jaime |
author2_role | edt edt |
author2_variant | s k sk m j l mj mjl |
author_facet | Khan, Shafiullah Lloret Mauri, Jaime |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)058898115 (DE-599)KEP058898115 (ORHE)9781466578043 |
dewey-full | 621.382 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.382 |
dewey-search | 621.382 |
dewey-sort | 3621.382 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03011cam a22005412 4500</leader><controlfield tag="001">ZDB-30-ORH-058898115</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115528.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201021s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466578043</subfield><subfield code="c">eBook</subfield><subfield code="9">978-1-4665-7804-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466578041</subfield><subfield code="c">eBook</subfield><subfield code="9">1-4665-7804-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306567904</subfield><subfield code="c">ebk</subfield><subfield code="9">1-306-56790-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306567909</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-306-56790-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058898115</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP058898115</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781466578043</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)058898115</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.382</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for multihop wireless networks</subfield><subfield code="c">[edited by] Shafiullah Khan and Jaime Lloret Mauri</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©20</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 524 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Online resource; title from PDF title page (CRCnetBASE, viewed on May 23, 2014)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Ad hoc networks (Computer networks)</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless sensor networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Transmission sans fil ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux ad hoc (Réseaux d'ordinateurs) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux de capteurs sans fil ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY & ENGINEERING ; Mechanical</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless communication systems ; Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Shafiullah</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lloret Mauri, Jaime</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781466578043</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781466578043</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781466578043/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-058898115 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:43Z |
institution | BVB |
isbn | 9781466578043 1466578041 1306567904 9781306567909 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xiv, 524 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
spelling | Security for multihop wireless networks [edited by] Shafiullah Khan and Jaime Lloret Mauri Boca Raton CRC Press, Taylor & Francis Group [2014] ©20 ©2014 1 Online-Ressource (xiv, 524 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Online resource; title from PDF title page (CRCnetBASE, viewed on May 23, 2014) Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. Wireless communication systems Security measures Ad hoc networks (Computer networks) Security measures Wireless sensor networks Security measures Transmission sans fil ; Sécurité ; Mesures Réseaux ad hoc (Réseaux d'ordinateurs) ; Sécurité ; Mesures Réseaux de capteurs sans fil ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Mechanical Wireless communication systems ; Security measures Khan, Shafiullah HerausgeberIn edt Lloret Mauri, Jaime HerausgeberIn edt 9781466578043 Erscheint auch als Druck-Ausgabe 9781466578043 |
spellingShingle | Security for multihop wireless networks Wireless communication systems Security measures Ad hoc networks (Computer networks) Security measures Wireless sensor networks Security measures Transmission sans fil ; Sécurité ; Mesures Réseaux ad hoc (Réseaux d'ordinateurs) ; Sécurité ; Mesures Réseaux de capteurs sans fil ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Mechanical Wireless communication systems ; Security measures |
title | Security for multihop wireless networks |
title_auth | Security for multihop wireless networks |
title_exact_search | Security for multihop wireless networks |
title_full | Security for multihop wireless networks [edited by] Shafiullah Khan and Jaime Lloret Mauri |
title_fullStr | Security for multihop wireless networks [edited by] Shafiullah Khan and Jaime Lloret Mauri |
title_full_unstemmed | Security for multihop wireless networks [edited by] Shafiullah Khan and Jaime Lloret Mauri |
title_short | Security for multihop wireless networks |
title_sort | security for multihop wireless networks |
topic | Wireless communication systems Security measures Ad hoc networks (Computer networks) Security measures Wireless sensor networks Security measures Transmission sans fil ; Sécurité ; Mesures Réseaux ad hoc (Réseaux d'ordinateurs) ; Sécurité ; Mesures Réseaux de capteurs sans fil ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Mechanical Wireless communication systems ; Security measures |
topic_facet | Wireless communication systems Security measures Ad hoc networks (Computer networks) Security measures Wireless sensor networks Security measures Transmission sans fil ; Sécurité ; Mesures Réseaux ad hoc (Réseaux d'ordinateurs) ; Sécurité ; Mesures Réseaux de capteurs sans fil ; Sécurité ; Mesures TECHNOLOGY & ENGINEERING ; Mechanical Wireless communication systems ; Security measures |
work_keys_str_mv | AT khanshafiullah securityformultihopwirelessnetworks AT lloretmaurijaime securityformultihopwirelessnetworks |