Skip to content

Bulletproof Wireless Security GSM, UMTS, 802. 11 and Ad Hoc Security

ISBN-10: 0750677465

ISBN-13: 9780750677462

Edition: 2005

Authors: Praphul Chandra

List price: $74.95
Shipping box This item qualifies for FREE shipping.
Blue ribbon 30 day, 100% satisfaction guarantee!
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Finally--a single volume guide to really effective security for both voice and data wireless networks! More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers. In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless applications. Inside this book you ll find coverage of these essential topics: + Cryptographic protocols used in wireless networks. + Key-based protocols, including key exchange and authentication techniques + Various types of wireless network attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks. + Encryption/decryption standards and methods. + Multi-layered security architectures. + Secure sockets layer (SSL) and transport layer security (TLS) protocols. + Cellular telephone network architectures and their vulnerabilities. + Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM). And you ll also find coverage on such cutting-edge topics as security techniques for ad hoc networks and protecting Bluetooth networks. If you re serious about wireless security, then this title belongs on your reference bookshelf! + Cryptographic protocols used in wireless networks. + Key-based protocols, including key exchange and authentication techniques + Various types of wirelessnetwork attacks, including reflection, session hijacks, and Fluhrer-Mantin-Shamir (FMS) attacks. + Encryption/decryption standards and methods. + Multi-layered security architectures. + Secure sockets layer (SSL) and transport layer security (TLS) protocols. + Cellular telephone network architectures and their vulnerabilities. + Modulation techniques, such as direct-sequence spread spectrum (DSSS) and orthogonal frequency division multiplexing (OFDM).
Customers also bought

Book details

List price: $74.95
Copyright year: 2005
Publisher: Elsevier Science & Technology Books
Publication date: 7/8/2005
Binding: Paperback
Pages: 272
Size: 7.25" wide x 8.75" long x 0.75" tall
Weight: 1.474
Language: English

Security and Cryptography
Network Security Protocols
Security and the Layered Architecture
Voice-Oriented Wireless Networks
Data-Oriented Wireless Networks
Security in Traditional Wireless Networks
Security in Wireless Local Area Networks
Security in Wireless Ad Hoc Networks