×
暂无评论
图文详情
  • ISBN:9787040366808
  • 装帧:一般胶版纸
  • 册数:暂无
  • 重量:暂无
  • 开本:16开
  • 页数:274
  • 出版时间:2013-05-01
  • 条形码:9787040366808 ; 978-7-04-036680-8

本书特色

     陈磊、季家凰、张自洪编写的《无线网络安全-- 理论与应用(英文版)/新一代信息科学与技术丛书》 是与springer合作出版的英文专著。      全书内容包含了经典及*新的无线网络安全的算 法、机理和技术,讨论了无线网络的安全问题,如 wlan、蓝牙、卫星、manet、传感器网络等。全书既 包含理论讲述,也注重实践技术应用,同时反映了无 线网络安全领域的新进展。      《无线网络安全--理论与应用(英文版)/新一代 信息科学与技术丛书》可供信息安全等学科从事研究 及应用的科研人员使用,也可供高年级本科生及研究 生在学习相关课程时参考使用。

内容简介

    陈磊、季家凰、张自洪编写的《无线网络安全--理论与应用(英文版)/新一代信息科学与技术丛书》是与springer合作出版的英文专著。内容新颖,覆盖全面,力求体现“理论+应用+实践”的特色。针对各种无线网络技术,先阐述原理,然后介绍应用实例。《无线网络安全--理论与应用(英文版)/新一代信息科学与技术丛书》可供信息安全等学科从事研究及应用的科研人员使用,也可供高年级本科生及研究生在学习相关课程时参考使用。

目录

chapter 1  applications, technologies, and standards insecure wireless networks and communications

  lei chen

    1.1  introduction

    1.2  overview of security in cellularnetworks and communications

    1.3  overview of security in wlans

    1.4  overview of security in wmans

    1.5  overview of security in bluetoothnetworks and communications

    1.6  overview of security in vanets

    1.7  overview of security in wsns

    1.8  overview of security in wmns

    1.9  overview of security in rfid networksand communications

    1.10  summary

    references

chapter 2  security in cellular networks andcommunications

  chuan-kun wu

    2.1  introduction

    2.2  security architecture of cellularcommunication networks

    2.3  security techniques in gsm networks

    2.4  security techniques in 3g networks

    2.5  security techniques in lte networks

    2.6  security issues in femtocell

    2.7  privacy issues in cellular networks

    2.8  security issues of mobile devices

    2.9  concluding remarks

    references

chapter 3  security in wireless local area networks

  chao yang and guofei gu

    3.1  introduction to wlan

    3.2  current state of wlan security

    3.3  wlan communication security

    3.4  wlan access point security

    3.5  other wlan security issues

    3.6  conclusion

    references

chapter 4  security in wireless metropolitan areanetworks

  lei chen, narasimha shashidhar, shengli yuan, and mingyang

    4.1  introduction

    4.2  fundamentals of wimax

    4.3  wimax security goals and solutions

    4.4  wimax security vulnerabilities, threats,and countermeasures

    4.5  summary 

    references

chapter 5  security in bluetooth networks andcommunications

  lei chen, peter cooper, and qingzhong liu

    5.1  introduction

    5.2  bluetooth primer

    5.3  bluetooth security solutions

    5.4  bluetooth security vulnerabilities,threats, and countermeasures

    5.5  conclusion 

    references

chapter 6  security in vehicular ad hoc networks(vanets)

  weidong yang

    6.1  introduction

    6.2  security architecture framework forvehicular ad hoc networks

    6.3  secure communication protocols forvehicular ad hoc network

    6.4  privacy enhancing and securepositioning

    6.5  conclusion 

    references

chapter 7  security in wireless sensor networks

  weiping wang, shigeng zhang, guihua duan, and hongsong

    7.1  introduction

    7.2  key management in wsns

    7.3  secure routing protocols in wsns

    7.4  location privacy protections in wsns

    7.5  secure data aggregation

    7.6  conclusion

    references

chapter 8  security in wireless sensor networks

  ping li, limin sun, xiangyan fu, and lin ning

    8.1  introduction

    8.2  overview of security architecture forwsn

    8.3  cryptographic approaches

    8.4  resilience on key management

    8.5  trust management

    8.6  location privacy

    8.7  conclusion

    references

chapter 9  security in wireless mesh networks

  chung-wei lee

    9.1  introduction

    9.2  wireless mesh networks (wmn)characteristics

    9.3  wmn security vulnerabilities

    9.4  wmn defense mechanisms

    9.5  wmn security standards and products

    9.6  conclusion

    references

chapter 10  security in rfid networks andcommunications

  chiu c. tan and jie wu

    10.1  introduction

    10.2  rfid network primer

    10.3  security requirements

    10.4  hardware based solutions

    10.5  basic protocol based solutions

    10.6  advance protocol based solutions

    10.7  commercial rfid security

    10.8  conclusion

    references

index

 

展开全部

预估到手价 ×

预估到手价是按参与促销活动、以最优惠的购买方案计算出的价格(不含优惠券部分),仅供参考,未必等同于实际到手价。

确定
快速
导航