0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Bluetooth Security Attacks - Comparative Analysis, Attacks, and Countermeasures (Paperback, 2013 ed.): Keijo Haataja,... Bluetooth Security Attacks - Comparative Analysis, Attacks, and Countermeasures (Paperback, 2013 ed.)
Keijo Haataja, Konstantin Hyppoenen, Sanna Pasanen, Pekka Toivanen
R1,353 Discovery Miles 13 530 Out of stock

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

Security Threats and Countermeasures in Bluetooth-Enabled Systems (Paperback): Keijo Haataja Security Threats and Countermeasures in Bluetooth-Enabled Systems (Paperback)
Keijo Haataja
R1,810 Discovery Miles 18 100 Out of stock

Bluetooth is a technology for short range wireless communication. It can be used to connect almost any device to another device. Bluetooth-enabled devices, such as mobile phones, headsets, PCs, laptops, printers, mice, and keyboards, are widely used all over the world. Therefore, it is very important to keep Bluetooth security issues up-to-date. The aim of this book is to evaluate security threats in Bluetooth-enabled systems. The book concentrates on practical aspects of Bluetooth security: weaknesses of Bluetooth security are studied, new attacks are proposed, new Bluetooth security analysis tools are implemented, practical experiments are carried out in our research laboratory, vulnerability evaluation is performed, countermeasures against discovered attacks are proposed, a comparative analysis of the Man-In-The-Middle attacks on Bluetooth is presented, a novel system for detecting and preventing intrusions in Bluetooth networks is proposed, and a further classification of Bluetooth-enabled networks is provided. This book helps all kinds of Bluetooth users, from home users to IT enterprise experts, to make sure that the security of their Bluetooth networks is strong enough

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Papery A5 WOW 2025 Diary - Giraffe…
R349 R300 Discovery Miles 3 000
A Beautiful Mess: Weekday Weekend - How…
Emma Chapman, Elsie Larson Hardcover  (1)
R570 R149 Discovery Miles 1 490
Vegan Christmas - Over 70 Amazing Vegan…
Gaz Oakley Hardcover  (1)
R350 R99 Discovery Miles 990
Beauty And The Beast - Blu-Ray + DVD
Emma Watson, Dan Stevens, … Blu-ray disc R326 Discovery Miles 3 260
Merry Christmas
Mariah Carey, Walter Afanasieff, … CD R122 R112 Discovery Miles 1 120
3 Layer Fabric Face Mask (Blue)
R15 Discovery Miles 150
Baby Dove Soap Bar Rich Moisture 75g
R20 Discovery Miles 200
Bostik Glue Stick - Loose (25g)
R31 Discovery Miles 310
ZA Cute Butterfly Earrings and Necklace…
R712 R499 Discovery Miles 4 990
Raz Tech Laptop Security Chain Cable…
R299 R169 Discovery Miles 1 690

 

Partners