Security for mobile networks and platforms:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Norwood, MA
Artech House
2006
|
Schriftenreihe: | Artech House universal personal communications series
|
Schlagworte: | |
Beschreibung: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Print version record |
Beschreibung: | 1 online resource (xvi, 313 pages) illustrations |
ISBN: | 9781596930094 1596930098 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045342614 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181206s2006 |||| o||u| ||||||eng d | ||
020 | |a 9781596930094 |9 978-1-59693-009-4 | ||
020 | |a 1596930098 |9 1-59693-009-8 | ||
035 | |a (ZDB-4-ENC)ocn228407058 | ||
035 | |a (OCoLC)228407058 | ||
035 | |a (DE-599)BVBBV045342614 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
082 | 0 | |a 621.384 |2 22 | |
100 | 1 | |a Aissi, Selim |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security for mobile networks and platforms |c Selim Aissi, Nora Dabbous, Anand R. Prasad |
264 | 1 | |a Norwood, MA |b Artech House |c 2006 | |
300 | |a 1 online resource (xvi, 313 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House universal personal communications series | |
500 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 | ||
500 | |a Print version record | ||
505 | 8 | |a With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Radio |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 4 | |a Computer networks |x Security measures | |
700 | 1 | |a Dabbous, Nora |e Sonstige |4 oth | |
700 | 1 | |a Prasad, Anand |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Aissi, Selim |t Security for mobile networks and platforms |d Norwood, MA : Artech House, 2006 |z 159693008X |z 9781596930087 |
912 | |a ZDB-4-ENC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030729317 |
Datensatz im Suchindex
_version_ | 1804179160551129088 |
---|---|
any_adam_object | |
author | Aissi, Selim |
author_facet | Aissi, Selim |
author_role | aut |
author_sort | Aissi, Selim |
author_variant | s a sa |
building | Verbundindex |
bvnumber | BV045342614 |
collection | ZDB-4-ENC |
contents | With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats |
ctrlnum | (ZDB-4-ENC)ocn228407058 (OCoLC)228407058 (DE-599)BVBBV045342614 |
dewey-full | 005.8 621.384 |
dewey-hundreds | 000 - Computer science, information, general works 600 - Technology (Applied sciences) |
dewey-ones | 005 - Computer programming, programs, data, security 621 - Applied physics |
dewey-raw | 005.8 621.384 |
dewey-search | 005.8 621.384 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03036nmm a2200469zc 4500</leader><controlfield tag="001">BV045342614</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181206s2006 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596930094</subfield><subfield code="9">978-1-59693-009-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596930098</subfield><subfield code="9">1-59693-009-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ENC)ocn228407058</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228407058</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045342614</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.384</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aissi, Selim</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for mobile networks and platforms</subfield><subfield code="c">Selim Aissi, Nora Dabbous, Anand R. Prasad</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwood, MA</subfield><subfield code="b">Artech House</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 313 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House universal personal communications series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Radio</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dabbous, Nora</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prasad, Anand</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Aissi, Selim</subfield><subfield code="t">Security for mobile networks and platforms</subfield><subfield code="d">Norwood, MA : Artech House, 2006</subfield><subfield code="z">159693008X</subfield><subfield code="z">9781596930087</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ENC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030729317</subfield></datafield></record></collection> |
id | DE-604.BV045342614 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:27Z |
institution | BVB |
isbn | 9781596930094 1596930098 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030729317 |
oclc_num | 228407058 |
open_access_boolean | |
physical | 1 online resource (xvi, 313 pages) illustrations |
psigel | ZDB-4-ENC |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Artech House |
record_format | marc |
series2 | Artech House universal personal communications series |
spelling | Aissi, Selim Verfasser aut Security for mobile networks and platforms Selim Aissi, Nora Dabbous, Anand R. Prasad Norwood, MA Artech House 2006 1 online resource (xvi, 313 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Artech House universal personal communications series Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002 Print version record With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures Dabbous, Nora Sonstige oth Prasad, Anand Sonstige oth Erscheint auch als Druck-Ausgabe Aissi, Selim Security for mobile networks and platforms Norwood, MA : Artech House, 2006 159693008X 9781596930087 |
spellingShingle | Aissi, Selim Security for mobile networks and platforms With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures |
title | Security for mobile networks and platforms |
title_auth | Security for mobile networks and platforms |
title_exact_search | Security for mobile networks and platforms |
title_full | Security for mobile networks and platforms Selim Aissi, Nora Dabbous, Anand R. Prasad |
title_fullStr | Security for mobile networks and platforms Selim Aissi, Nora Dabbous, Anand R. Prasad |
title_full_unstemmed | Security for mobile networks and platforms Selim Aissi, Nora Dabbous, Anand R. Prasad |
title_short | Security for mobile networks and platforms |
title_sort | security for mobile networks and platforms |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh TECHNOLOGY & ENGINEERING / Radio bisacsh TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer networks Security measures |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security TECHNOLOGY & ENGINEERING / Radio TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications COMPUTERS / Security / General Computer networks / Security measures Computer networks Security measures |
work_keys_str_mv | AT aissiselim securityformobilenetworksandplatforms AT dabbousnora securityformobilenetworksandplatforms AT prasadanand securityformobilenetworksandplatforms |