当前位置: 首页 > 资源下载 > 网络通信安全 > 查看资源

资源分类
Web开发
Java
.NET
编程语言
数据库
软件工程
图形动画
系统管理
网络通信安全
计算机理论
考试认证
人文百科
文档手册
硬件技术
办公软件

Wireless Internet Security: Architecture and Protocols

Wireless Internet Security: Architecture and Protocols

书名:Wireless Internet Security: Architecture and Protocols

上传:石头

时间:2009-09-18

文件大小:965.19 KB

资源出处:查看资源出处 >>

收藏到网摘: n/a



作者:James Kempf
出版日期:October 27, 2008
出版社:Cambridge University Press
页数:224
ISBN:ISBN-10: 0521887836 ISBN-13: 978-0521887830
文件格式:PDF


Product Description
In describing tools for internet security, this title focuses onunderstanding the system architecture of existing security and ondeveloping architectural changes for new security services. Topicsinclude security threats in wireless networks, security services forcountering those threats, and the process of defining functionalarchitecture for network systems. Kempf also discusses examples ofwireless Internet security systems such as wireless network accesscontrol, local IP subnet configuration and address resolution, andlocation privacy. Each chapter describes the basic network architectureand protocols for the system under consideration, security threats,functional architecture, and the important internet protocols thatimplement the architecture. This is an ideal resource for graduatestudents of electrical engineering and computer science, as well as forengineers and system architects in the wireless network industry.
Book Description
Approaching wireless Internet security from the position of systemarchitecture, this text describes the cryptographic and protocol-basedtools for Internet security, highlighting their application in wirelessnetworks. Rather than dealing with specific standards or products, thefocus throughout is on the architectural and practical design aspectsof wireless security systems.
Tags:ArchitectureInternetProtocolsSecurityWireless


相关书籍

  • Security and Usability: Designing Secure Systems that People Can Use
  • Security and Usability: Designing Secure Systems that People Can Use
  • Deploying Voice over Wireless LANs (CHM英文版)
  • The Tao of Network Security Monitoring Beyond Intrusion Detection
  • Computer and Information Security Handbook

评论 (0) All

登陆 | 还没注册?