Wireless Internet security: architecture and protocols
Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new s...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge
Cambridge University Press
2008
|
Schlagworte: | |
Online-Zugang: | BSB01 FHN01 Volltext |
Zusammenfassung: | Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry |
Beschreibung: | Title from publisher's bibliographic system (viewed on 05 Oct 2015) |
Beschreibung: | 1 online resource (ix, 212 pages) |
ISBN: | 9780511754739 |
DOI: | 10.1017/CBO9780511754739 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043942882 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 161206s2008 |||| o||u| ||||||eng d | ||
020 | |a 9780511754739 |c Online |9 978-0-511-75473-9 | ||
024 | 7 | |a 10.1017/CBO9780511754739 |2 doi | |
035 | |a (ZDB-20-CBO)CR9780511754739 | ||
035 | |a (OCoLC)851076401 | ||
035 | |a (DE-599)BVBBV043942882 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 |a DE-92 | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 205 |0 (DE-625)143613: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Kempf, James |d 1952- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Wireless Internet security |b architecture and protocols |c James Kempf |
264 | 1 | |a Cambridge |b Cambridge University Press |c 2008 | |
300 | |a 1 online resource (ix, 212 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from publisher's bibliographic system (viewed on 05 Oct 2015) | ||
520 | |a Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry | ||
650 | 4 | |a Wireless Internet / Security measures | |
650 | 0 | 7 | |a Funknetz |0 (DE-588)4216130-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Funknetz |0 (DE-588)4216130-7 |D s |
689 | 0 | 1 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-0-521-88783-0 |
856 | 4 | 0 | |u https://doi.org/10.1017/CBO9780511754739 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-20-CBO | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029351852 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u https://doi.org/10.1017/CBO9780511754739 |l BSB01 |p ZDB-20-CBO |q BSB_PDA_CBO |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1017/CBO9780511754739 |l FHN01 |p ZDB-20-CBO |q FHN_PDA_CBO |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176886261088256 |
---|---|
any_adam_object | |
author | Kempf, James 1952- |
author_facet | Kempf, James 1952- |
author_role | aut |
author_sort | Kempf, James 1952- |
author_variant | j k jk |
building | Verbundindex |
bvnumber | BV043942882 |
classification_rvk | ST 205 ST 277 |
collection | ZDB-20-CBO |
ctrlnum | (ZDB-20-CBO)CR9780511754739 (OCoLC)851076401 (DE-599)BVBBV043942882 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1017/CBO9780511754739 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03105nmm a2200505zc 4500</leader><controlfield tag="001">BV043942882</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161206s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780511754739</subfield><subfield code="c">Online</subfield><subfield code="9">978-0-511-75473-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1017/CBO9780511754739</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-20-CBO)CR9780511754739</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)851076401</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043942882</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-92</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 205</subfield><subfield code="0">(DE-625)143613:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kempf, James</subfield><subfield code="d">1952-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Wireless Internet security</subfield><subfield code="b">architecture and protocols</subfield><subfield code="c">James Kempf</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge</subfield><subfield code="b">Cambridge University Press</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 212 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from publisher's bibliographic system (viewed on 05 Oct 2015)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wireless Internet / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Funknetz</subfield><subfield code="0">(DE-588)4216130-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-0-521-88783-0</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1017/CBO9780511754739</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-20-CBO</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029351852</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511754739</subfield><subfield code="l">BSB01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">BSB_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1017/CBO9780511754739</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-20-CBO</subfield><subfield code="q">FHN_PDA_CBO</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043942882 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:39:18Z |
institution | BVB |
isbn | 9780511754739 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029351852 |
oclc_num | 851076401 |
open_access_boolean | |
owner | DE-12 DE-92 |
owner_facet | DE-12 DE-92 |
physical | 1 online resource (ix, 212 pages) |
psigel | ZDB-20-CBO ZDB-20-CBO BSB_PDA_CBO ZDB-20-CBO FHN_PDA_CBO |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Cambridge University Press |
record_format | marc |
spelling | Kempf, James 1952- Verfasser aut Wireless Internet security architecture and protocols James Kempf Cambridge Cambridge University Press 2008 1 online resource (ix, 212 pages) txt rdacontent c rdamedia cr rdacarrier Title from publisher's bibliographic system (viewed on 05 Oct 2015) Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry Wireless Internet / Security measures Funknetz (DE-588)4216130-7 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Funknetz (DE-588)4216130-7 s Internet (DE-588)4308416-3 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 Erscheint auch als Druckausgabe 978-0-521-88783-0 https://doi.org/10.1017/CBO9780511754739 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Kempf, James 1952- Wireless Internet security architecture and protocols Wireless Internet / Security measures Funknetz (DE-588)4216130-7 gnd Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd |
subject_GND | (DE-588)4216130-7 (DE-588)4274324-2 (DE-588)4308416-3 |
title | Wireless Internet security architecture and protocols |
title_auth | Wireless Internet security architecture and protocols |
title_exact_search | Wireless Internet security architecture and protocols |
title_full | Wireless Internet security architecture and protocols James Kempf |
title_fullStr | Wireless Internet security architecture and protocols James Kempf |
title_full_unstemmed | Wireless Internet security architecture and protocols James Kempf |
title_short | Wireless Internet security |
title_sort | wireless internet security architecture and protocols |
title_sub | architecture and protocols |
topic | Wireless Internet / Security measures Funknetz (DE-588)4216130-7 gnd Computersicherheit (DE-588)4274324-2 gnd Internet (DE-588)4308416-3 gnd |
topic_facet | Wireless Internet / Security measures Funknetz Computersicherheit Internet |
url | https://doi.org/10.1017/CBO9780511754739 |
work_keys_str_mv | AT kempfjames wirelessinternetsecurityarchitectureandprotocols |