|
Showing 1 - 3 of
3 matches in All Departments
Java Card is one of the latest developments in the area of
multi-application and platform-independent smart cards. As a
working tool for professionals, this easy-to-understand resource
provides clear, detailed guidance on smart cards, credit and debit
cards, Java Card and Open Card Framework (OCF). It offers in-depth
coverage of important standards, open specifications and critical
security issues, including common threats and security mechanisms
regarding the card and its connection interface. The book explains
how to program a Java Card applet, an OCF card service and a
terminal application. What's more, the book presents an informative
case study on the credit-debit application, offering a detailed
road map of the application development process.
In the world of e-commerce, security has quickly become of
paramount importance. This unique book provides an in-depth
understanding of basic security problems and relevant e-commerce
solutions. From designing secure Web, e-commerce, and mobile
commerce applications to securing internal networks to providing
secure employee/user authentication, this cutting-edge book gives
professionals the tools they need to solve their e-commerce
security problems.
As the use of wireless devices becomes widespread, so does the need
for strong and secure transport protocols. Even with this
intensified need for securing systems, using cryptography does not
seem to be a viable solution due to difficulties in implementation.
The security layers of many wireless protocols use outdated
encryption algorithms, which have proven unsuitable for hardware
usage, particularly with handheld devices. Summarizing key issues
involved in achieving desirable performance in security
implementations, Wireless Security and Cryptography: Specifications
and Implementations focuses on alternative integration approaches
for wireless communication security. It gives an overview of the
current security layer of wireless protocols and presents the
performance characteristics of implementations in both software and
hardware. This resource also presents efficient and novel methods
to execute security schemes in wireless protocols with high
performance. It provides the state of the art research trends in
implementations of wireless protocol security for current and
future wireless communications. Unique in its coverage of
specification and implementation concerns that include hardware
design techniques, Wireless Security and Cryptography:
Specifications and Implementations provides thorough coverage of
wireless network security and recent research directions in the
field.
|
You may like...
The Wonder Of You
Elvis Presley, Royal Philharmonic Orchestra
CD
R48
Discovery Miles 480
Widows
Viola Davis, Michelle Rodriguez, …
Blu-ray disc
R22
R19
Discovery Miles 190
The Car
Arctic Monkeys
CD
R383
Discovery Miles 3 830
|