Security for telecommunications networks:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
Springer
2008
|
Schriftenreihe: | Advances in information security
40 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverz. S. [167] - 177 |
Beschreibung: | X, 181 S. graph. Darst. |
ISBN: | 9780387724416 0387724419 9780387724423 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035124380 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 081028s2008 d||| |||| 00||| eng d | ||
015 | |a 07,N20,0097 |2 dnb | ||
016 | 7 | |a 983876797 |2 DE-101 | |
020 | |a 9780387724416 |c Gb. : ca. EUR 90.63 (freier Pr.), ca. sfr 139.00 (freier Pr.) |9 978-0-387-72441-6 | ||
020 | |a 0387724419 |c Gb. : ca. EUR 90.63 (freier Pr.), ca. sfr 139.00 (freier Pr.) |9 0-387-72441-9 | ||
020 | |a 9780387724423 |c Gb. : ca. EUR 90.63 (freier Pr.), ca. sfr 139.00 (freier Pr.) |9 978-0-387-72442-3 | ||
024 | 3 | |a 9780387724416 | |
028 | 5 | 2 | |a 12023851 |
035 | |a (OCoLC)255665463 | ||
035 | |a (DE-599)DNB983876797 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-11 | ||
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ZN 6560 |0 (DE-625)157572: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
100 | 1 | |a Traynor, Patrick |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security for telecommunications networks |c by Patrick Traynor ; Patrick McDaniel ; Thomas La Porta |
264 | 1 | |a New York, NY |b Springer |c 2008 | |
300 | |a X, 181 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Advances in information security |v 40 | |
500 | |a Literaturverz. S. [167] - 177 | ||
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zellulares Mobilfunksystem |0 (DE-588)4387563-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Telekommunikationsnetz |0 (DE-588)4133586-7 |D s |
689 | 0 | 1 | |a Zellulares Mobilfunksystem |0 (DE-588)4387563-4 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 3 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a McDaniel, Patrick |e Verfasser |0 (DE-588)133895335 |4 aut | |
700 | 1 | |a La Porta, Thomas |e Verfasser |4 aut | |
830 | 0 | |a Advances in information security |v 40 |w (DE-604)BV022281064 |9 40 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016791990&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016791990 |
Datensatz im Suchindex
_version_ | 1804138103731912704 |
---|---|
adam_text | Contents
1 Introduction............................................... 1
1.1 Telecommunications Networks............................. 2
1.2 Network Convergence and Security........................ 3
1.3 Outline of this Book..................................... 4
1.4 Audience............................................... 5
1.5 Other Sources of Information............................. 6
Part I Network Architecture
2 Security................................................... 9
2.1 Overview............................................... 9
2.1.1 What is security?.................................. 9
2.1.2 Basic Terminology................................. 10
2.1.3 Attacks.......................................... 11
2.1.4 Trust............................................ 11
2.2 Services and Tools....................................... 12
2.2.1 Cryptography..................................... 12
2.2.2 Authentication and Authorization................... 15
2.2.3 Certificates and PKI............................... 16
2.3 Network Security........................................ 16
2.3.1 IPsec............................................ 16
2.3.2 SSL/TLS......................................... 18
2.3.3 Firewalls......................................... 19
2.3.4 Intrusion and Anomaly Detection ................... 20
2.4 Summary............................................... 22
3 Cellular Architecture...................................... 23
3.1 History of Cellular Telephony............................. 24
3.2 Cellular Voice Networks.................................. 26
3.2.1 Voice Network Elements............................ 26
VIII Contents
3.2.2 Home Location Register............................ 27
3.2.3 Mobile Switching Center/Visiting Location Register ... 29
3.2.4 Base Station Subsystem............................ 29
3.3 Cellular Data Networks.................................. 30
3.3.1 Data Network Elements............................ 30
3.3.2 Gateway GPRS Support Node...................... 31
3.3.3 Serving GPRS Support Node....................... 32
3.4 Signaling Network and Protocols.......................... 33
3.4.1 Common Channel Signaling Network ................ 34
3.4.2 Message Transfer Part............................. 34
3.4.3 Signaling Connection Control Part................... 35
3.4.4 Transaction Capabilities Application Part............ 36
3.4.5 Mobile Application Part............................ 36
3.4.6 ISDN User Part................................... 36
3.5 Wireless Network........................................ 36
3.5.1 Wireless Access Techniques......................... 37
3.5.2 Frequency Issues.................................. 39
3.5.3 Voice Encoding................................... 43
3.5.4 Summary of Procedures............................ 45
3.6 Registration and Call Setup Procedures.................... 46
3.7 Core Network Security................................... 48
3.8 Air Interface Security.................................... 49
3.9 Summary............................................... 51
Part II Vulnerability Analysis
4 Vulnerabilities in the Telephony........................... 55
4.1 Weak Cryptographic Algorithms.......................... 55
4.2 Vulnerabilities in the Network Core........................ 58
4.3 Wireless Eavesdropping.................................. 60
4.4 Jamming............................................... 61
4.5 User Tracking and Privacy................................ 62
4.6 Overload............................................... 62
4.7 Malware................................................ 63
5 Vulnerabilities in the Short Messaging Service (SMS)...... 65
5.1 History and Description.................................. 66
5.2 Delivering Messages..................................... 66
5.2.1 Submitting a Message.............................. 66
5.2.2 Routing a Message................................ 67
5.2.3 Wireless Delivery.................................. 68
5.3 Identifying System Bottlenecks............................ 69
5.3.1 Queue Management ............................... 70
5.3.2 Message Injection................................. 71
Contents IX
5.4 Efficient Device Targeting................................ 72
5.4.1 NPA/NXX....................................... 73
5.4.2 Web Scraping..................................... 73
5.4.3 Testing Phone Liveness .......................... 74
5.4.4 Additional Collection Methods...................... 75
5.5 Modeling Denial of Service ............................... 76
5.5.1 Attacking Individuals.............................. 76
5.5.2 Metropolitan Area Service.......................... 77
5.5.3 Regional Service .................................. 81
5.6 Network Characterization ................................ 82
5.7 Attack Characterization.................................. 85
5.8 Current Solutions ....................................... 87
5.9 Queue Management...................................... 89
5.9.1 Weighted Fair Queuing............................. 89
5.9.2 Weighted Random Early Detection.................. 92
5.9.3 Summary......................................... 96
5.10 Resource Provisioning.................................... 96
5.10.1 Strict Resource Provisioning........................ 97
5.10.2 Dynamic Resource Provisioning.....................100
5.10.3 Direct Channel Allocation..........................102
5.10.4 Summary.........................................105
5.11 Combining Mechanisms..................................105
5.12 Summary...............................................107
6 Vulnerabilities in Cellular Data Networks..................109
6.1 History and Description..................................110
6.2 Delivering Packets from the Internet.......................Ill
6.2.1 Device Registration................................Ill
6.2.2 Submitting Packets................................112
6.2.3 Routing Packets...................................112
6.2.4 Wireless Delivery..................................113
6.3 Packet Multiplexing .....................................115
6.4 Exploiting Cellular Data Services..........................116
6.4.1 Determining Network Settings......................116
6.4.2 Exploiting Teardown Mechanisms...................117
6.4.3 Exploiting Setup Mechanisms.......................121
6.5 Conflicts in Network Design ..............................124
6.6 Efficient Mitigation of Data Network Vulnerabilities .........129
6.7 Summary...............................................130
7 Vulnerabilities in Voice over IP............................133
7.1 History and Description..................................134
7.2 Session Initiation Protocol................................135
7.2.1 Architecture......................................135
7.2.2 SIP Messages.....................................136
Contents
7.2.3 Making Phone Calls...............................139
7.3 IP-Multimedia Subsystem Network........................140
7.3.1 IMS Architecture..................................140
7.3.2 Making Phone Calls...............................141
7.4 IMS Versus Pure Internet Telephony.......................141
7.5 Wireless Issues..........................................142
7.6 Security Issues..........................................144
7.6.1 Current Solutions.................................145
7.6.2 Analysis of Emerging Vulnerabilities.................148
7.7 Building Secure IP Telephony Networks....................152
7.8 Summary...............................................153
Part III Future Analyses
8 Future Directions and Challenges..........................157
8.1 Denial of Service Attacks.................................157
8.1.1 Logical vs Flooding Attacks........................157
8.1.2 Problems in Controlled Networks..................158
8.2 End-To-End Arguments and Security......................159
8.3 The Future of Rigid Systems..............................160
8.4 Moving Forward.........................................161
Glossary.......................................................163
References.....................................................167
Index..........................................................179
|
adam_txt |
Contents
1 Introduction. 1
1.1 Telecommunications Networks. 2
1.2 Network Convergence and Security. 3
1.3 Outline of this Book. 4
1.4 Audience. 5
1.5 Other Sources of Information. 6
Part I Network Architecture
2 Security. 9
2.1 Overview. 9
2.1.1 What is security?. 9
2.1.2 Basic Terminology. 10
2.1.3 Attacks. 11
2.1.4 Trust. 11
2.2 Services and Tools. 12
2.2.1 Cryptography. 12
2.2.2 Authentication and Authorization. 15
2.2.3 Certificates and PKI. 16
2.3 Network Security. 16
2.3.1 IPsec. 16
2.3.2 SSL/TLS. 18
2.3.3 Firewalls. 19
2.3.4 Intrusion and Anomaly Detection . 20
2.4 Summary. 22
3 Cellular Architecture. 23
3.1 History of Cellular Telephony. 24
3.2 Cellular Voice Networks. 26
3.2.1 Voice Network Elements. 26
VIII Contents
3.2.2 Home Location Register. 27
3.2.3 Mobile Switching Center/Visiting Location Register . 29
3.2.4 Base Station Subsystem. 29
3.3 Cellular Data Networks. 30
3.3.1 Data Network Elements. 30
3.3.2 Gateway GPRS Support Node. 31
3.3.3 Serving GPRS Support Node. 32
3.4 Signaling Network and Protocols. 33
3.4.1 Common Channel Signaling Network . 34
3.4.2 Message Transfer Part. 34
3.4.3 Signaling Connection Control Part. 35
3.4.4 Transaction Capabilities Application Part. 36
3.4.5 Mobile Application Part. 36
3.4.6 ISDN User Part. 36
3.5 Wireless Network. 36
3.5.1 Wireless Access Techniques. 37
3.5.2 Frequency Issues. 39
3.5.3 Voice Encoding. 43
3.5.4 Summary of Procedures. 45
3.6 Registration and Call Setup Procedures. 46
3.7 Core Network Security. 48
3.8 Air Interface Security. 49
3.9 Summary. 51
Part II Vulnerability Analysis
4 Vulnerabilities in the Telephony. 55
4.1 Weak Cryptographic Algorithms. 55
4.2 Vulnerabilities in the Network Core. 58
4.3 Wireless Eavesdropping. 60
4.4 Jamming. 61
4.5 User Tracking and Privacy. 62
4.6 Overload. 62
4.7 Malware. 63
5 Vulnerabilities in the Short Messaging Service (SMS). 65
5.1 History and Description. 66
5.2 Delivering Messages. 66
5.2.1 Submitting a Message. 66
5.2.2 Routing a Message. 67
5.2.3 Wireless Delivery. 68
5.3 Identifying System Bottlenecks. 69
5.3.1 Queue Management . 70
5.3.2 Message Injection. 71
Contents IX
5.4 Efficient Device Targeting. 72
5.4.1 NPA/NXX. 73
5.4.2 Web Scraping. 73
5.4.3 Testing Phone "Liveness" . 74
5.4.4 Additional Collection Methods. 75
5.5 Modeling Denial of Service . 76
5.5.1 Attacking Individuals. 76
5.5.2 Metropolitan Area Service. 77
5.5.3 Regional Service . 81
5.6 Network Characterization . 82
5.7 Attack Characterization. 85
5.8 Current Solutions . 87
5.9 Queue Management. 89
5.9.1 Weighted Fair Queuing. 89
5.9.2 Weighted Random Early Detection. 92
5.9.3 Summary. 96
5.10 Resource Provisioning. 96
5.10.1 Strict Resource Provisioning. 97
5.10.2 Dynamic Resource Provisioning.100
5.10.3 Direct Channel Allocation.102
5.10.4 Summary.105
5.11 Combining Mechanisms.105
5.12 Summary.107
6 Vulnerabilities in Cellular Data Networks.109
6.1 History and Description.110
6.2 Delivering Packets from the Internet.Ill
6.2.1 Device Registration.Ill
6.2.2 Submitting Packets.112
6.2.3 Routing Packets.112
6.2.4 Wireless Delivery.113
6.3 Packet Multiplexing .115
6.4 Exploiting Cellular Data Services.116
6.4.1 Determining Network Settings.116
6.4.2 Exploiting Teardown Mechanisms.117
6.4.3 Exploiting Setup Mechanisms.121
6.5 Conflicts in Network Design .124
6.6 Efficient Mitigation of Data Network Vulnerabilities .129
6.7 Summary.130
7 Vulnerabilities in Voice over IP.133
7.1 History and Description.134
7.2 Session Initiation Protocol.135
7.2.1 Architecture.135
7.2.2 SIP Messages.136
Contents
7.2.3 Making Phone Calls.139
7.3 IP-Multimedia Subsystem Network.140
7.3.1 IMS Architecture.140
7.3.2 Making Phone Calls.141
7.4 IMS Versus Pure Internet Telephony.141
7.5 Wireless Issues.142
7.6 Security Issues.144
7.6.1 Current Solutions.145
7.6.2 Analysis of Emerging Vulnerabilities.148
7.7 Building Secure IP Telephony Networks.152
7.8 Summary.153
Part III Future Analyses
8 Future Directions and Challenges.157
8.1 Denial of Service Attacks.157
8.1.1 Logical vs Flooding Attacks.157
8.1.2 Problems in "Controlled" Networks.158
8.2 End-To-End Arguments and Security.159
8.3 The Future of Rigid Systems.160
8.4 Moving Forward.161
Glossary.163
References.167
Index.179 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Traynor, Patrick McDaniel, Patrick La Porta, Thomas |
author_GND | (DE-588)133895335 |
author_facet | Traynor, Patrick McDaniel, Patrick La Porta, Thomas |
author_role | aut aut aut |
author_sort | Traynor, Patrick |
author_variant | p t pt p m pm p t l pt ptl |
building | Verbundindex |
bvnumber | BV035124380 |
classification_rvk | ST 277 ZN 6560 |
ctrlnum | (OCoLC)255665463 (DE-599)DNB983876797 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
discipline_str_mv | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02387nam a2200553 cb4500</leader><controlfield tag="001">BV035124380</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">081028s2008 d||| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">07,N20,0097</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">983876797</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387724416</subfield><subfield code="c">Gb. : ca. EUR 90.63 (freier Pr.), ca. sfr 139.00 (freier Pr.)</subfield><subfield code="9">978-0-387-72441-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0387724419</subfield><subfield code="c">Gb. : ca. EUR 90.63 (freier Pr.), ca. sfr 139.00 (freier Pr.)</subfield><subfield code="9">0-387-72441-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780387724423</subfield><subfield code="c">Gb. : ca. EUR 90.63 (freier Pr.), ca. sfr 139.00 (freier Pr.)</subfield><subfield code="9">978-0-387-72442-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9780387724416</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12023851</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255665463</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB983876797</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZN 6560</subfield><subfield code="0">(DE-625)157572:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Traynor, Patrick</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for telecommunications networks</subfield><subfield code="c">by Patrick Traynor ; Patrick McDaniel ; Thomas La Porta</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 181 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advances in information security</subfield><subfield code="v">40</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. [167] - 177</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zellulares Mobilfunksystem</subfield><subfield code="0">(DE-588)4387563-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Telekommunikationsnetz</subfield><subfield code="0">(DE-588)4133586-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zellulares Mobilfunksystem</subfield><subfield code="0">(DE-588)4387563-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McDaniel, Patrick</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)133895335</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">La Porta, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advances in information security</subfield><subfield code="v">40</subfield><subfield code="w">(DE-604)BV022281064</subfield><subfield code="9">40</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016791990&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016791990</subfield></datafield></record></collection> |
id | DE-604.BV035124380 |
illustrated | Illustrated |
index_date | 2024-07-02T22:22:17Z |
indexdate | 2024-07-09T21:22:52Z |
institution | BVB |
isbn | 9780387724416 0387724419 9780387724423 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016791990 |
oclc_num | 255665463 |
open_access_boolean | |
owner | DE-573 DE-11 |
owner_facet | DE-573 DE-11 |
physical | X, 181 S. graph. Darst. |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Advances in information security |
series2 | Advances in information security |
spelling | Traynor, Patrick Verfasser aut Security for telecommunications networks by Patrick Traynor ; Patrick McDaniel ; Thomas La Porta New York, NY Springer 2008 X, 181 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Advances in information security 40 Literaturverz. S. [167] - 177 Datensicherung (DE-588)4011144-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Telekommunikationsnetz (DE-588)4133586-7 gnd rswk-swf Zellulares Mobilfunksystem (DE-588)4387563-4 gnd rswk-swf Telekommunikationsnetz (DE-588)4133586-7 s Zellulares Mobilfunksystem (DE-588)4387563-4 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s DE-604 McDaniel, Patrick Verfasser (DE-588)133895335 aut La Porta, Thomas Verfasser aut Advances in information security 40 (DE-604)BV022281064 40 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016791990&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Traynor, Patrick McDaniel, Patrick La Porta, Thomas Security for telecommunications networks Advances in information security Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Telekommunikationsnetz (DE-588)4133586-7 gnd Zellulares Mobilfunksystem (DE-588)4387563-4 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4274324-2 (DE-588)4133586-7 (DE-588)4387563-4 |
title | Security for telecommunications networks |
title_auth | Security for telecommunications networks |
title_exact_search | Security for telecommunications networks |
title_exact_search_txtP | Security for telecommunications networks |
title_full | Security for telecommunications networks by Patrick Traynor ; Patrick McDaniel ; Thomas La Porta |
title_fullStr | Security for telecommunications networks by Patrick Traynor ; Patrick McDaniel ; Thomas La Porta |
title_full_unstemmed | Security for telecommunications networks by Patrick Traynor ; Patrick McDaniel ; Thomas La Porta |
title_short | Security for telecommunications networks |
title_sort | security for telecommunications networks |
topic | Datensicherung (DE-588)4011144-1 gnd Computersicherheit (DE-588)4274324-2 gnd Telekommunikationsnetz (DE-588)4133586-7 gnd Zellulares Mobilfunksystem (DE-588)4387563-4 gnd |
topic_facet | Datensicherung Computersicherheit Telekommunikationsnetz Zellulares Mobilfunksystem |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016791990&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV022281064 |
work_keys_str_mv | AT traynorpatrick securityfortelecommunicationsnetworks AT mcdanielpatrick securityfortelecommunicationsnetworks AT laportathomas securityfortelecommunicationsnetworks |