This book identifies vulnerabilities in the physical layer, the
MAC layer, the IP layer, the transport layer, and the application
layer, of wireless networks, and discusses ways to strengthen
security mechanisms and services. Topics covered include intrusion
detection, secure PHY/MAC/routing protocols, attacks and
prevention, immunization, key management, secure group
communications and multicast, secure location services, monitoring
and surveillance, anonymity, privacy, trust
establishment/management, redundancy and security, and dependable
wireless networking.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!