注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當前位置: 首頁出版圖書科學技術(shù)計算機/網(wǎng)絡(luò)網(wǎng)絡(luò)與數(shù)據(jù)通信網(wǎng)絡(luò)組建與管理Wireless Network Security:Theories and Applications(無線網(wǎng)絡(luò)安全——理論與應(yīng)用)

Wireless Network Security:Theories and Applications(無線網(wǎng)絡(luò)安全——理論與應(yīng)用)

Wireless Network Security:Theories and Applications(無線網(wǎng)絡(luò)安全——理論與應(yīng)用)

定 價:¥69.00

作 者: 陳磊,季家凰,張自洪 主編
出版社: 高等教育出版社
叢編項:
標 簽: 計算機/網(wǎng)絡(luò) 網(wǎng)絡(luò)配置與管理 網(wǎng)絡(luò)與數(shù)據(jù)通信

ISBN: 9787040366808 出版時間: 2013-05-01 包裝: 平裝
開本: 16開 頁數(shù): 274 字數(shù):  

內(nèi)容簡介

  陳磊、季家凰、張自洪編寫的《無線網(wǎng)絡(luò)安全:理論與應(yīng)用(英文版)/新一代信息科學與技術(shù)叢書》 是與Springer合作出版的英文專著。 全書內(nèi)容包含了經(jīng)典及最新的無線網(wǎng)絡(luò)安全的算 法、機理和技術(shù),討論了無線網(wǎng)絡(luò)的安全問題,如WLAN、藍牙、衛(wèi)星、MANET、傳感器網(wǎng)絡(luò)等。全書既 包含理論講述,也注重實踐技術(shù)應(yīng)用,同時反映了無線網(wǎng)絡(luò)安全領(lǐng)域的新進展。 《無線網(wǎng)絡(luò)安全:理論與應(yīng)用(英文版)/新一代信息科學與技術(shù)叢書》可供信息安全等學科從事研究 及應(yīng)用的科研人員使用,也可供高年級本科生及研究 生在學習相關(guān)課程時參考使用。

作者簡介

暫缺《Wireless Network Security:Theories and Applications(無線網(wǎng)絡(luò)安全——理論與應(yīng)用)》作者簡介

圖書目錄

Chapter 1  Applications, Technologies, and Standards in Secure Wireless Networks and Communications   Lei Chen     1.1  Introduction     1.2  Overview of Security in Cellular Networks and Communications     1.3  Overview of Security in WLANs     1.4  Overview of Security in WMANs     1.5  Overview of Security in Bluetooth Networks and Communications     1.6  Overview of Security in VANETs     1.7  Overview of Security in WSNs     1.8  Overview of Security in WMNs     1.9  Overview of Security in RFID Networks and Communications     1.10  Summary     References Chapter 2  Security in Cellular Networks and Communications   Chuan-Kun Wu     2.1  Introduction     2.2  Security architecture of cellular communication networks     2.3  Security techniques in GSM networks     2.4  Security techniques in 3G networks     2.5  Security techniques in LTE networks     2.6  Security issues in femtocell     2.7  Privacy issues in cellular networks     2.8  Security issues of mobile devices     2.9  Concluding remarks     References Chapter 3  Security in Wireless Local Area Networks   Chao Yang and Guofei Gu     3.1  Introduction to WLAN     3.2  Current State of WLAN Security     3.3  WLAN Communication Security     3.4  WLAN Access Point Security     3.5  Other WLAN Security Issues     3.6  Conclusion     References Chapter 4  Security in Wireless Metropolitan Area Networks   Lei Chen, Narasimha Shashidhar, Shengli Yuan, and Ming Yang     4.1  Introduction     4.2  Fundamentals of WiMAX     4.3  WiMAX security goals and solutions     4.4  WiMAX security vulnerabilities, threats, and countermeasures     4.5  Summary      References Chapter 5  Security in Bluetooth Networks and Communications   Lei Chen, Peter Cooper, and Qingzhong Liu     5.1  Introduction     5.2  Bluetooth Primer     5.3  Bluetooth Security Solutions     5.4  Bluetooth Security Vulnerabilities, Threats, and Countermeasures     5.5  Conclusion      References Chapter 6  Security in Vehicular Ad Hoc Networks (VANETs)   Weidong Yang     6.1  Introduction     6.2  Security Architecture Framework for Vehicular Ad Hoc Networks     6.3  Secure Communication protocols for Vehicular Ad Hoc Network     6.4  Privacy Enhancing and Secure Positioning     6.5  Conclusion      References Chapter 7  Security in Wireless Sensor Networks   Weiping Wang, Shigeng Zhang, Guihua Duan, and Hong Song     7.1  Introduction     7.2  Key management in WSNs     7.3  Secure routing protocols in WSNs     7.4  Location privacy protections in WSNs     7.5  Secure data aggregation     7.6  Conclusion     References Chapter 8  Security in Wireless Sensor Networks   Ping Li, Limin Sun, Xiangyan Fu, and Lin Ning     8.1  Introduction     8.2  Overview of security architecture for WSN     8.3  Cryptographic Approaches     8.4  Resilience on Key Management     8.5  Trust Management     8.6  Location Privacy     8.7  Conclusion     References Chapter 9  Security in Wireless Mesh Networks   Chung-wei Lee     9.1  Introduction     9.2  Wireless Mesh Networks (WMN) Characteristics     9.3  WMN Security Vulnerabilities     9.4  WMN Defense Mechanisms     9.5  WMN Security Standards and Products     9.6  Conclusion     References Chapter 10  Security in RFID Networks and Communications   Chiu C. Tan and Jie Wu     10.1  Introduction     10.2  RFID Network Primer     10.3  Security Requirements     10.4  Hardware Based Solutions     10.5  Basic Protocol Based Solutions     10.6  Advance Protocol Based Solutions     10.7  Commercial RFID Security     10.8  Conclusion     References Index  

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號