This specific ISBN edition is currently not available.View all copies of this ISBN edition:
With their book, Nichols and Lekkas pick up the gauntlet and provide a comprehensive guide for managers and policy makers involved with wireless communications. They explain the vulnerabilities, response options, and real-world costs associated with wireless platforms and applications, plus information needed to help develop the background and skills required to: Recognize new and established threats to wireless systems; Close gaps that threaten privacy, profits, and customer loyalty; Replace temporary, fragmented, and partial solutions with more robust and durable answers; Weigh platforms against characteristic attacks and protections; Apply clear guidelines for the best solutions now and going forward; Prepare for the boom in m-business; Assess today's protocol options and compensate for documented shortcomings. Contents same as US/UK editions.
"synopsis" may belong to another edition of this title.
Book Description Tata McGraw-Hill Education Pvt. Ltd., 2006. Softcover. Condition: New. First edition. Table of contents Chapter 1 Why is Wireless Different? Chapter 2 Wireless Information Warfare Chapter 3 Telephone System Vulnerabilities Chapter 4 Satellite Communications Chapter 5 Cryptographic Security Chapter 6 Speech Cryptology Chapter 7 The Wireless Local Area Network (WLAN) Chapter 8 Wireless Application Protocol (WAP) Chapter 9 Wireless Transport Layer Security (WTLS) Chapter 10 Bluetooth Chapter 11 Voice Over Internet Protocol Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13 Optimizing Wireless Security with FPGAs and ASICs Bibliography Index Printed Pages: 0. Seller Inventory # 22619