Security in ad hoc and sensor networks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Singapore ; Hackensack, NJ
World Scientific
2010
|
Schriftenreihe: | Computer and network security
v. 3 |
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xii, 406 pages) illustrations |
ISBN: | 9789814271097 9814271098 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045344066 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181206s2010 |||| o||u| ||||||eng d | ||
020 | |a 9789814271097 |9 978-981-4271-09-7 | ||
020 | |a 9814271098 |9 981-4271-09-8 | ||
035 | |a (ZDB-4-ENC)ocn670429880 | ||
035 | |a (OCoLC)670429880 | ||
035 | |a (DE-599)BVBBV045344066 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 621.38 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Beyah, Raheem |d 1976- |e Verfasser |4 aut | |
245 | 1 | 0 | |a Security in ad hoc and sensor networks |c Raheem Beyah, Janise McNair, Cherita Corbett |
264 | 1 | |a Singapore ; Hackensack, NJ |b World Scientific |c 2010 | |
300 | |a 1 online resource (xii, 406 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Computer and network security |v v. 3 | |
500 | |a Print version record | ||
505 | 8 | |a Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Electrical |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Wireless communication systems / Security measures |2 fast | |
650 | 7 | |a Electrical Engineering |2 hilcc | |
650 | 7 | |a Engineering & Applied Sciences |2 hilcc | |
650 | 7 | |a Electrical & Computer Engineering |2 hilcc | |
650 | 4 | |a Sensor networks |x Security measures |a Wireless communication systems |x Security measures |a Computer networks |x Security measures | |
650 | 0 | 7 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Ad-hoc-Netz |0 (DE-588)4674811-8 |D s |
689 | 0 | 1 | |a Drahtloses Sensorsystem |0 (DE-588)4789222-5 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a McNair, Janise |d 1968- |e Sonstige |4 oth | |
700 | 1 | |a Corbett, Cherita |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Beyah, Raheem (Raheem A.), 1976- |t Security in ad hoc and sensor networks |d Singapore ; Hackensack, NJ : World Scientific, 2010 |z 9789814271080 |
912 | |a ZDB-4-ENC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030730770 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179163425275904 |
---|---|
any_adam_object | |
author | Beyah, Raheem 1976- |
author_facet | Beyah, Raheem 1976- |
author_role | aut |
author_sort | Beyah, Raheem 1976- |
author_variant | r b rb |
building | Verbundindex |
bvnumber | BV045344066 |
classification_rvk | ST 277 |
collection | ZDB-4-ENC |
contents | Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas |
ctrlnum | (ZDB-4-ENC)ocn670429880 (OCoLC)670429880 (DE-599)BVBBV045344066 |
dewey-full | 621.38 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 621 - Applied physics |
dewey-raw | 621.38 |
dewey-search | 621.38 |
dewey-sort | 3621.38 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03057nmm a2200553zcb4500</leader><controlfield tag="001">BV045344066</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181206s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789814271097</subfield><subfield code="9">978-981-4271-09-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9814271098</subfield><subfield code="9">981-4271-09-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ENC)ocn670429880</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)670429880</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045344066</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">621.38</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beyah, Raheem</subfield><subfield code="d">1976-</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security in ad hoc and sensor networks</subfield><subfield code="c">Raheem Beyah, Janise McNair, Cherita Corbett</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Singapore ; Hackensack, NJ</subfield><subfield code="b">World Scientific</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 406 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Computer and network security</subfield><subfield code="v">v. 3</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Electrical</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Wireless communication systems / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electrical Engineering</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Engineering & Applied Sciences</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electrical & Computer Engineering</subfield><subfield code="2">hilcc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sensor networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Wireless communication systems</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Ad-hoc-Netz</subfield><subfield code="0">(DE-588)4674811-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Drahtloses Sensorsystem</subfield><subfield code="0">(DE-588)4789222-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">McNair, Janise</subfield><subfield code="d">1968-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Corbett, Cherita</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Beyah, Raheem (Raheem A.), 1976-</subfield><subfield code="t">Security in ad hoc and sensor networks</subfield><subfield code="d">Singapore ; Hackensack, NJ : World Scientific, 2010</subfield><subfield code="z">9789814271080</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ENC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030730770</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV045344066 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:30Z |
institution | BVB |
isbn | 9789814271097 9814271098 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030730770 |
oclc_num | 670429880 |
open_access_boolean | |
physical | 1 online resource (xii, 406 pages) illustrations |
psigel | ZDB-4-ENC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | World Scientific |
record_format | marc |
series2 | Computer and network security |
spelling | Beyah, Raheem 1976- Verfasser aut Security in ad hoc and sensor networks Raheem Beyah, Janise McNair, Cherita Corbett Singapore ; Hackensack, NJ World Scientific 2010 1 online resource (xii, 406 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Computer and network security v. 3 Print version record Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas TECHNOLOGY & ENGINEERING / Electrical bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Electrical Engineering hilcc Engineering & Applied Sciences hilcc Electrical & Computer Engineering hilcc Sensor networks Security measures Wireless communication systems Security measures Computer networks Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Drahtloses Sensorsystem (DE-588)4789222-5 gnd rswk-swf Ad-hoc-Netz (DE-588)4674811-8 s Drahtloses Sensorsystem (DE-588)4789222-5 s Computersicherheit (DE-588)4274324-2 s 1\p DE-604 McNair, Janise 1968- Sonstige oth Corbett, Cherita Sonstige oth Erscheint auch als Druck-Ausgabe Beyah, Raheem (Raheem A.), 1976- Security in ad hoc and sensor networks Singapore ; Hackensack, NJ : World Scientific, 2010 9789814271080 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Beyah, Raheem 1976- Security in ad hoc and sensor networks Security issues in ad hoc and sensor networks have become extremely important. This edited book provides a comprehensive treatment for security issues in these networks, ranging from attack mitigation to recovery after an attack has been successfully executed. Security issues addressed include (but are not limited to) attacks, malicious node detection, access control, authentication, intrusion detection, privacy and anonymity, key management, location verification, security architectures and protocols, secrecy and integrity, network resilience and survivability, and trust models. This complete book provides an excellent reference for students, researchers, and industry practitioners related to these areas TECHNOLOGY & ENGINEERING / Electrical bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Electrical Engineering hilcc Engineering & Applied Sciences hilcc Electrical & Computer Engineering hilcc Sensor networks Security measures Wireless communication systems Security measures Computer networks Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd Computersicherheit (DE-588)4274324-2 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd |
subject_GND | (DE-588)4674811-8 (DE-588)4274324-2 (DE-588)4789222-5 |
title | Security in ad hoc and sensor networks |
title_auth | Security in ad hoc and sensor networks |
title_exact_search | Security in ad hoc and sensor networks |
title_full | Security in ad hoc and sensor networks Raheem Beyah, Janise McNair, Cherita Corbett |
title_fullStr | Security in ad hoc and sensor networks Raheem Beyah, Janise McNair, Cherita Corbett |
title_full_unstemmed | Security in ad hoc and sensor networks Raheem Beyah, Janise McNair, Cherita Corbett |
title_short | Security in ad hoc and sensor networks |
title_sort | security in ad hoc and sensor networks |
topic | TECHNOLOGY & ENGINEERING / Electrical bisacsh Computer networks / Security measures fast Wireless communication systems / Security measures fast Electrical Engineering hilcc Engineering & Applied Sciences hilcc Electrical & Computer Engineering hilcc Sensor networks Security measures Wireless communication systems Security measures Computer networks Security measures Ad-hoc-Netz (DE-588)4674811-8 gnd Computersicherheit (DE-588)4274324-2 gnd Drahtloses Sensorsystem (DE-588)4789222-5 gnd |
topic_facet | TECHNOLOGY & ENGINEERING / Electrical Computer networks / Security measures Wireless communication systems / Security measures Electrical Engineering Engineering & Applied Sciences Electrical & Computer Engineering Sensor networks Security measures Wireless communication systems Security measures Computer networks Security measures Ad-hoc-Netz Computersicherheit Drahtloses Sensorsystem |
work_keys_str_mv | AT beyahraheem securityinadhocandsensornetworks AT mcnairjanise securityinadhocandsensornetworks AT corbettcherita securityinadhocandsensornetworks |