Wireless Security: Models, Threats, and Solutions

0 avg rating
( 0 ratings by Goodreads )
9780070618848: Wireless Security: Models, Threats, and Solutions
View all copies of this ISBN edition:

With their book, Nichols and Lekkas pick up the gauntlet and provide a comprehensive guide for managers and policy makers involved with wireless communications. They explain the vulnerabilities, response options, and real-world costs associated with wireless platforms and applications, plus information needed to help develop the background and skills required to: Recognize new and established threats to wireless systems; Close gaps that threaten privacy, profits, and customer loyalty; Replace temporary, fragmented, and partial solutions with more robust and durable answers; Weigh platforms against characteristic attacks and protections; Apply clear guidelines for the best solutions now and going forward; Prepare for the boom in m-business; Assess today's protocol options and compensate for documented shortcomings. Contents same as US/UK editions.

"synopsis" may belong to another edition of this title.

Buy New View Book

Shipping: US$ 9.38
From India to U.S.A.

Destination, rates & speeds

Add to Basket

Other Popular Editions of the Same Title

9780071380386: Wireless Security: Models, Threats, and Solutions

Featured Edition

ISBN 10:  0071380388 ISBN 13:  9780071380386
Publisher: McGraw-Hill Professional, 2001

9780071207072: Wireless Security: Models, Threats, and Solutions

Tata M..., 2001

Top Search Results from the AbeBooks Marketplace


Panos Lekkas, Randall Nichols
Published by Tata McGraw-Hill Education Pvt. Ltd. (2006)
ISBN 10: 0070618844 ISBN 13: 9780070618848
New Softcover First Edition Quantity Available: > 20
(New Delhi, India)

Book Description Tata McGraw-Hill Education Pvt. Ltd., 2006. Softcover. Condition: New. First edition. Table of contents Chapter 1 Why is Wireless Different? Chapter 2 Wireless Information Warfare Chapter 3 Telephone System Vulnerabilities Chapter 4 Satellite Communications Chapter 5 Cryptographic Security Chapter 6 Speech Cryptology Chapter 7 The Wireless Local Area Network (WLAN) Chapter 8 Wireless Application Protocol (WAP) Chapter 9 Wireless Transport Layer Security (WTLS) Chapter 10 Bluetooth Chapter 11 Voice Over Internet Protocol Chapter 12 Hardware Perspectives for End-to-End Security (E2E) in Wireless Applications Chapter 13 Optimizing Wireless Security with FPGAs and ASICs Bibliography Index Printed Pages: 0. Seller Inventory # 22619

More information about this seller | Contact this seller

Buy New
US$ 16.25
Convert currency

Add to Basket

Shipping: US$ 9.38
From India to U.S.A.
Destination, rates & speeds