Security in ad hoc and sensor networks /:
Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore ; Hackensack, NJ :
World Scientific,
©2010.
|
Schriftenreihe: | Computer and network security ;
v. 3. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas. |
Beschreibung: | 1 online resource (xii, 406 pages) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9789814271097 9814271098 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn670429880 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 101018s2010 si a ob 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d E7B |d OCLCQ |d CNKEY |d CBT |d OCLCQ |d UIU |d OCLCQ |d DEBSZ |d OCLCQ |d NLGGC |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d AZK |d LOA |d JBG |d AGLDB |d MOR |d PIFAG |d ZCU |d MERUC |d OCLCQ |d U3W |d OCLCF |d STF |d WRM |d VTS |d ICG |d INT |d AU@ |d OCLCQ |d DKC |d OCLCQ |d M8D |d LEAUB |d UKCRE |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 764546246 |a 961518875 |a 962599010 |a 966200156 |a 988486237 |a 992001705 |a 1037728330 |a 1038668951 |a 1086430795 |a 1153504433 | ||
020 | |a 9789814271097 |q (electronic bk.) | ||
020 | |a 9814271098 |q (electronic bk.) | ||
020 | |z 9789814271080 | ||
020 | |z 981427108X | ||
035 | |a (OCoLC)670429880 |z (OCoLC)764546246 |z (OCoLC)961518875 |z (OCoLC)962599010 |z (OCoLC)966200156 |z (OCoLC)988486237 |z (OCoLC)992001705 |z (OCoLC)1037728330 |z (OCoLC)1038668951 |z (OCoLC)1086430795 |z (OCoLC)1153504433 | ||
050 | 4 | |a TK5105.59 |b .B49 2010eb | |
072 | 7 | |a TEC |x 007000 |2 bisacsh | |
082 | 7 | |a 621.38 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Beyah, Raheem |q (Raheem A.), |d 1976- |1 https://id.oclc.org/worldcat/entity/E39PCjKJQ8HtRrYcbgdk8p6R8C |0 http://id.loc.gov/authorities/names/no2010003651 | |
245 | 1 | 0 | |a Security in ad hoc and sensor networks / |c Raheem Beyah, Janise McNair, Cherita Corbett. |
260 | |a Singapore ; |a Hackensack, NJ : |b World Scientific, |c ©2010. | ||
300 | |a 1 online resource (xii, 406 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Series in computer and network security ; |v v. 3 | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. | |
520 | |a Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Sensor networks |x Security measures. | |
650 | 0 | |a Wireless communication systems |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Réseaux de capteurs |x Sécurité |x Mesures. | |
650 | 6 | |a Transmission sans fil |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Electrical. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Wireless communication systems |x Security measures |2 fast | |
700 | 1 | |a McNair, Janise |q (Janise Yvette), |d 1968- |1 https://id.oclc.org/worldcat/entity/E39PCjC768kT43RX6gJJh6tFXb |0 http://id.loc.gov/authorities/names/no2010003652 | |
700 | 1 | |a Corbett, Cherita |q (Cherita L.) |1 https://id.oclc.org/worldcat/entity/E39PCjGTYRWWkq7FHCX33x6Kbd |0 http://id.loc.gov/authorities/names/no2010003653 | |
758 | |i has work: |a Security in ad hoc and sensor networks (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFXRWmKr8yxbqc6YxBPxXd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Beyah, Raheem (Raheem A.), 1976- |t Security in ad hoc and sensor networks. |d Singapore ; Hackensack, NJ : World Scientific, ©2010 |z 9789814271080 |w (OCoLC)456137797 |
830 | 0 | |a Computer and network security ; |v v. 3. |0 http://id.loc.gov/authorities/names/no2008008076 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=340572 |3 Volltext |
938 | |a ebrary |b EBRY |n ebr10422496 | ||
938 | |a EBSCOhost |b EBSC |n 340572 | ||
938 | |a YBP Library Services |b YANK |n 3511399 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn670429880 |
---|---|
_version_ | 1816881742936539136 |
adam_text | |
any_adam_object | |
author | Beyah, Raheem (Raheem A.), 1976- |
author2 | McNair, Janise (Janise Yvette), 1968- Corbett, Cherita (Cherita L.) |
author2_role | |
author2_variant | j m jm c c cc |
author_GND | http://id.loc.gov/authorities/names/no2010003651 http://id.loc.gov/authorities/names/no2010003652 http://id.loc.gov/authorities/names/no2010003653 |
author_facet | Beyah, Raheem (Raheem A.), 1976- McNair, Janise (Janise Yvette), 1968- Corbett, Cherita (Cherita L.) |
author_role | |
author_sort | Beyah, Raheem 1976- |
author_variant | r b rb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .B49 2010eb |
callnumber-search | TK5105.59 .B49 2010eb |
callnumber-sort | TK 45105.59 B49 42010EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. |
ctrlnum | (OCoLC)670429880 |
dewey-full | 621.38 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.38 |
dewey-search | 621.38 |
dewey-sort | 3621.38 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04409cam a2200601 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn670429880</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">101018s2010 si a ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CNKEY</subfield><subfield code="d">CBT</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UIU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCF</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">LEAUB</subfield><subfield code="d">UKCRE</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">764546246</subfield><subfield code="a">961518875</subfield><subfield code="a">962599010</subfield><subfield code="a">966200156</subfield><subfield code="a">988486237</subfield><subfield code="a">992001705</subfield><subfield code="a">1037728330</subfield><subfield code="a">1038668951</subfield><subfield code="a">1086430795</subfield><subfield code="a">1153504433</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814271097</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9814271098</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9789814271080</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">981427108X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)670429880</subfield><subfield code="z">(OCoLC)764546246</subfield><subfield code="z">(OCoLC)961518875</subfield><subfield code="z">(OCoLC)962599010</subfield><subfield code="z">(OCoLC)966200156</subfield><subfield code="z">(OCoLC)988486237</subfield><subfield code="z">(OCoLC)992001705</subfield><subfield code="z">(OCoLC)1037728330</subfield><subfield code="z">(OCoLC)1038668951</subfield><subfield code="z">(OCoLC)1086430795</subfield><subfield code="z">(OCoLC)1153504433</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.B49 2010eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">007000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">621.38</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beyah, Raheem</subfield><subfield code="q">(Raheem A.),</subfield><subfield code="d">1976-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjKJQ8HtRrYcbgdk8p6R8C</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010003651</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in ad hoc and sensor networks /</subfield><subfield code="c">Raheem Beyah, Janise McNair, Cherita Corbett.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Singapore ;</subfield><subfield code="a">Hackensack, NJ :</subfield><subfield code="b">World Scientific,</subfield><subfield code="c">©2010.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 406 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Series in computer and network security ;</subfield><subfield code="v">v. 3</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux de capteurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Transmission sans fil</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Electrical.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McNair, Janise</subfield><subfield code="q">(Janise Yvette),</subfield><subfield code="d">1968-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjC768kT43RX6gJJh6tFXb</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010003652</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Corbett, Cherita</subfield><subfield code="q">(Cherita L.)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGTYRWWkq7FHCX33x6Kbd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010003653</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security in ad hoc and sensor networks (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFXRWmKr8yxbqc6YxBPxXd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Beyah, Raheem (Raheem A.), 1976-</subfield><subfield code="t">Security in ad hoc and sensor networks.</subfield><subfield code="d">Singapore ; Hackensack, NJ : World Scientific, ©2010</subfield><subfield code="z">9789814271080</subfield><subfield code="w">(OCoLC)456137797</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Computer and network security ;</subfield><subfield code="v">v. 3.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2008008076</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=340572</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10422496</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">340572</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3511399</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn670429880 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:34Z |
institution | BVB |
isbn | 9789814271097 9814271098 |
language | English |
oclc_num | 670429880 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xii, 406 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | World Scientific, |
record_format | marc |
series | Computer and network security ; |
series2 | Series in computer and network security ; |
spelling | Beyah, Raheem (Raheem A.), 1976- https://id.oclc.org/worldcat/entity/E39PCjKJQ8HtRrYcbgdk8p6R8C http://id.loc.gov/authorities/names/no2010003651 Security in ad hoc and sensor networks / Raheem Beyah, Janise McNair, Cherita Corbett. Singapore ; Hackensack, NJ : World Scientific, ©2010. 1 online resource (xii, 406 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Series in computer and network security ; v. 3 Includes bibliographical references. pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas. Print version record. Sensor networks Security measures. Wireless communication systems Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux de capteurs Sécurité Mesures. Transmission sans fil Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Electrical. bisacsh Computer networks Security measures fast Wireless communication systems Security measures fast McNair, Janise (Janise Yvette), 1968- https://id.oclc.org/worldcat/entity/E39PCjC768kT43RX6gJJh6tFXb http://id.loc.gov/authorities/names/no2010003652 Corbett, Cherita (Cherita L.) https://id.oclc.org/worldcat/entity/E39PCjGTYRWWkq7FHCX33x6Kbd http://id.loc.gov/authorities/names/no2010003653 has work: Security in ad hoc and sensor networks (Text) https://id.oclc.org/worldcat/entity/E39PCFXRWmKr8yxbqc6YxBPxXd https://id.oclc.org/worldcat/ontology/hasWork Print version: Beyah, Raheem (Raheem A.), 1976- Security in ad hoc and sensor networks. Singapore ; Hackensack, NJ : World Scientific, ©2010 9789814271080 (OCoLC)456137797 Computer and network security ; v. 3. http://id.loc.gov/authorities/names/no2008008076 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=340572 Volltext |
spellingShingle | Beyah, Raheem (Raheem A.), 1976- Security in ad hoc and sensor networks / Computer and network security ; pt. 1. Authentication and confidentiality -- pt. 2. Privacy -- pt. 3. Reliability -- pt. 4. Network management and configuration. Sensor networks Security measures. Wireless communication systems Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux de capteurs Sécurité Mesures. Transmission sans fil Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Electrical. bisacsh Computer networks Security measures fast Wireless communication systems Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 |
title | Security in ad hoc and sensor networks / |
title_auth | Security in ad hoc and sensor networks / |
title_exact_search | Security in ad hoc and sensor networks / |
title_full | Security in ad hoc and sensor networks / Raheem Beyah, Janise McNair, Cherita Corbett. |
title_fullStr | Security in ad hoc and sensor networks / Raheem Beyah, Janise McNair, Cherita Corbett. |
title_full_unstemmed | Security in ad hoc and sensor networks / Raheem Beyah, Janise McNair, Cherita Corbett. |
title_short | Security in ad hoc and sensor networks / |
title_sort | security in ad hoc and sensor networks |
topic | Sensor networks Security measures. Wireless communication systems Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux de capteurs Sécurité Mesures. Transmission sans fil Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Electrical. bisacsh Computer networks Security measures fast Wireless communication systems Security measures fast |
topic_facet | Sensor networks Security measures. Wireless communication systems Security measures. Computer networks Security measures. Réseaux de capteurs Sécurité Mesures. Transmission sans fil Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. TECHNOLOGY & ENGINEERING Electrical. Computer networks Security measures Wireless communication systems Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=340572 |
work_keys_str_mv | AT beyahraheem securityinadhocandsensornetworks AT mcnairjanise securityinadhocandsensornetworks AT corbettcherita securityinadhocandsensornetworks |