Security for mobile networks and platforms /:
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indi...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Norwood, MA :
Artech House,
©2006.
|
Schriftenreihe: | Artech House universal personal communications series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats. |
Beschreibung: | 1 online resource (xvi, 313 pages) : illustrations |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781596930094 1596930098 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn228407058 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080520s2006 maua ob 001 0 eng d | ||
010 | |z 2006284848 | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d OCLCF |d OCLCE |d E7B |d BUF |d YDXCP |d OCLCO |d FVL |d OCLCQ |d P4I |d OCLCQ |d NLGGC |d OCLCQ |d AZK |d COCUF |d CNNOR |d MOR |d PIFAG |d OTZ |d OCLCQ |d WY@ |d U3W |d BRL |d STF |d WRM |d JBG |d OCLCQ |d VTS |d INT |d VT2 |d CUY |d OCLCQ |d WYU |d A6Q |d OCLCQ |d K6U |d CEF |d M8D |d UKAHL |d HS0 |d UKCRE |d AGLDB |d IEEEE |d OCLCO |d OCLCQ |d ANO |d OCLCQ |d OCLCO |d INARC |d OCLCL | ||
019 | |a 232333708 |a 607647804 |a 609260368 |a 659287225 |a 722650481 |a 728022868 |a 961545318 |a 962668052 |a 974197429 |a 981400213 |a 981621761 |a 988488532 |a 991945517 |a 992033073 |a 995038998 |a 1005949435 |a 1018083785 |a 1037508800 |a 1038593523 |a 1043036561 |a 1053528349 |a 1055393191 |a 1063965085 |a 1076307945 |a 1081252109 |a 1089311440 |a 1096473617 |a 1153518941 |a 1156976142 |a 1228600223 |a 1248608501 |a 1257338361 |a 1349301722 |a 1407443984 | ||
020 | |a 9781596930094 |q (electronic bk.) | ||
020 | |a 1596930098 |q (electronic bk.) | ||
020 | |z 159693008X | ||
020 | |z 9781596930087 | ||
035 | |a (OCoLC)228407058 |z (OCoLC)232333708 |z (OCoLC)607647804 |z (OCoLC)609260368 |z (OCoLC)659287225 |z (OCoLC)722650481 |z (OCoLC)728022868 |z (OCoLC)961545318 |z (OCoLC)962668052 |z (OCoLC)974197429 |z (OCoLC)981400213 |z (OCoLC)981621761 |z (OCoLC)988488532 |z (OCoLC)991945517 |z (OCoLC)992033073 |z (OCoLC)995038998 |z (OCoLC)1005949435 |z (OCoLC)1018083785 |z (OCoLC)1037508800 |z (OCoLC)1038593523 |z (OCoLC)1043036561 |z (OCoLC)1053528349 |z (OCoLC)1055393191 |z (OCoLC)1063965085 |z (OCoLC)1076307945 |z (OCoLC)1081252109 |z (OCoLC)1089311440 |z (OCoLC)1096473617 |z (OCoLC)1153518941 |z (OCoLC)1156976142 |z (OCoLC)1228600223 |z (OCoLC)1248608501 |z (OCoLC)1257338361 |z (OCoLC)1349301722 |z (OCoLC)1407443984 | ||
042 | |a dlr | ||
050 | 4 | |a TK5103.2 |b .A435 2006eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a TEC |x 034000 |2 bisacsh | |
072 | 7 | |a TEC |x 061000 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 621.384 |2 22 | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Aissi, Selim. |0 http://id.loc.gov/authorities/names/nb2006022273 | |
245 | 1 | 0 | |a Security for mobile networks and platforms / |c Selim Aissi, Nora Dabbous, Anand R. Prasad. |
260 | |a Norwood, MA : |b Artech House, |c ©2006. | ||
300 | |a 1 online resource (xvi, 313 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Artech House universal personal communications series | |
504 | |a Includes bibliographical references and index. | ||
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
588 | 0 | |a Print version record. | |
520 | 3 | |a With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats. |c Publisher abstract. | |
505 | 0 | |a Security for Mobile Networks and Platforms; Contents v; Preface xv; 1 Introduction 1; 2 Authentication, Authorization, and Non-Repudiation 13; 3 Cryptographic Techniques 23; 4 Hardware Security 45; 5 Software Security 67; 6 Security Certification and Evaluation 93; 7 Higher Layer Security 105; 8 IP Layer Security 117; 9 AAA 135; 10 IEEE 802.1X and EAP 149; 11 WPAN Security 163; 12 WLANs Security 177; 13 WMAN 217; 14 WWAN Security 231; 15 Future Security Challenges 245; 16 Mobile Security Threat Catalog 277; List of Acronyms 287; About the Authors 301; Index 303 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Radio. |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Mobile & Wireless Communications. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
653 | |a Mobile Communication | ||
653 | |a Technology, Engineering, Agriculture | ||
653 | |a Technologie, Ingenieurswissenschaft, Landwirtschaft | ||
653 | |a Technologie, ingénierie et agriculture | ||
653 | |a Energy technology & engineering | ||
653 | |a Energietechnik, Elektrotechnik und Energiemaschinenbau | ||
653 | |a Génie industriel | ||
653 | |a Electrical engineering | ||
653 | |a Elektrotechnik | ||
653 | |a Electrotechnique | ||
700 | 1 | |a Dabbous, Nora. |0 http://id.loc.gov/authorities/names/nb2006022275 | |
700 | 1 | |a Prasad, Anand. |0 http://id.loc.gov/authorities/names/n2001014054 | |
758 | |i has work: |a Security for mobile networks and platforms (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGRYKGXVvMCqWX9GX33VJC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Aissi, Selim. |t Security for mobile networks and platforms. |d Norwood, MA : Artech House, ©2006 |z 159693008X |z 9781596930087 |w (DLC) 2006284848 |w (OCoLC)70997875 |
830 | 0 | |a Artech House universal personal communications series. |0 http://id.loc.gov/authorities/names/n98091836 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=225211 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH28882030 | ||
938 | |a EBSCOhost |b EBSC |n 225211 | ||
938 | |a IEEE |b IEEE |n 9101096 | ||
938 | |a YBP Library Services |b YANK |n 2812276 | ||
938 | |a Internet Archive |b INAR |n securityformobil0000aiss | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn228407058 |
---|---|
_version_ | 1816881667084648448 |
adam_text | |
any_adam_object | |
author | Aissi, Selim |
author2 | Dabbous, Nora Prasad, Anand |
author2_role | |
author2_variant | n d nd a p ap |
author_GND | http://id.loc.gov/authorities/names/nb2006022273 http://id.loc.gov/authorities/names/nb2006022275 http://id.loc.gov/authorities/names/n2001014054 |
author_facet | Aissi, Selim Dabbous, Nora Prasad, Anand |
author_role | |
author_sort | Aissi, Selim |
author_variant | s a sa |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5103 |
callnumber-raw | TK5103.2 .A435 2006eb |
callnumber-search | TK5103.2 .A435 2006eb |
callnumber-sort | TK 45103.2 A435 42006EB |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Security for Mobile Networks and Platforms; Contents v; Preface xv; 1 Introduction 1; 2 Authentication, Authorization, and Non-Repudiation 13; 3 Cryptographic Techniques 23; 4 Hardware Security 45; 5 Software Security 67; 6 Security Certification and Evaluation 93; 7 Higher Layer Security 105; 8 IP Layer Security 117; 9 AAA 135; 10 IEEE 802.1X and EAP 149; 11 WPAN Security 163; 12 WLANs Security 177; 13 WMAN 217; 14 WWAN Security 231; 15 Future Security Challenges 245; 16 Mobile Security Threat Catalog 277; List of Acronyms 287; About the Authors 301; Index 303 |
ctrlnum | (OCoLC)228407058 |
dewey-full | 621.384 005.8 |
dewey-hundreds | 600 - Technology (Applied sciences) 000 - Computer science, information, general works |
dewey-ones | 621 - Applied physics 005 - Computer programming, programs, data, security |
dewey-raw | 621.384 005.8 |
dewey-search | 621.384 005.8 |
dewey-sort | 3621.384 |
dewey-tens | 620 - Engineering and allied operations 000 - Computer science, information, general works |
discipline | Informatik Elektrotechnik / Elektronik / Nachrichtentechnik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07067cam a2200877 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn228407058</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">080520s2006 maua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2006284848</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCE</subfield><subfield code="d">E7B</subfield><subfield code="d">BUF</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">P4I</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OTZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">CUY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">CEF</subfield><subfield code="d">M8D</subfield><subfield code="d">UKAHL</subfield><subfield code="d">HS0</subfield><subfield code="d">UKCRE</subfield><subfield code="d">AGLDB</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ANO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">232333708</subfield><subfield code="a">607647804</subfield><subfield code="a">609260368</subfield><subfield code="a">659287225</subfield><subfield code="a">722650481</subfield><subfield code="a">728022868</subfield><subfield code="a">961545318</subfield><subfield code="a">962668052</subfield><subfield code="a">974197429</subfield><subfield code="a">981400213</subfield><subfield code="a">981621761</subfield><subfield code="a">988488532</subfield><subfield code="a">991945517</subfield><subfield code="a">992033073</subfield><subfield code="a">995038998</subfield><subfield code="a">1005949435</subfield><subfield code="a">1018083785</subfield><subfield code="a">1037508800</subfield><subfield code="a">1038593523</subfield><subfield code="a">1043036561</subfield><subfield code="a">1053528349</subfield><subfield code="a">1055393191</subfield><subfield code="a">1063965085</subfield><subfield code="a">1076307945</subfield><subfield code="a">1081252109</subfield><subfield code="a">1089311440</subfield><subfield code="a">1096473617</subfield><subfield code="a">1153518941</subfield><subfield code="a">1156976142</subfield><subfield code="a">1228600223</subfield><subfield code="a">1248608501</subfield><subfield code="a">1257338361</subfield><subfield code="a">1349301722</subfield><subfield code="a">1407443984</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596930094</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596930098</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">159693008X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781596930087</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)228407058</subfield><subfield code="z">(OCoLC)232333708</subfield><subfield code="z">(OCoLC)607647804</subfield><subfield code="z">(OCoLC)609260368</subfield><subfield code="z">(OCoLC)659287225</subfield><subfield code="z">(OCoLC)722650481</subfield><subfield code="z">(OCoLC)728022868</subfield><subfield code="z">(OCoLC)961545318</subfield><subfield code="z">(OCoLC)962668052</subfield><subfield code="z">(OCoLC)974197429</subfield><subfield code="z">(OCoLC)981400213</subfield><subfield code="z">(OCoLC)981621761</subfield><subfield code="z">(OCoLC)988488532</subfield><subfield code="z">(OCoLC)991945517</subfield><subfield code="z">(OCoLC)992033073</subfield><subfield code="z">(OCoLC)995038998</subfield><subfield code="z">(OCoLC)1005949435</subfield><subfield code="z">(OCoLC)1018083785</subfield><subfield code="z">(OCoLC)1037508800</subfield><subfield code="z">(OCoLC)1038593523</subfield><subfield code="z">(OCoLC)1043036561</subfield><subfield code="z">(OCoLC)1053528349</subfield><subfield code="z">(OCoLC)1055393191</subfield><subfield code="z">(OCoLC)1063965085</subfield><subfield code="z">(OCoLC)1076307945</subfield><subfield code="z">(OCoLC)1081252109</subfield><subfield code="z">(OCoLC)1089311440</subfield><subfield code="z">(OCoLC)1096473617</subfield><subfield code="z">(OCoLC)1153518941</subfield><subfield code="z">(OCoLC)1156976142</subfield><subfield code="z">(OCoLC)1228600223</subfield><subfield code="z">(OCoLC)1248608501</subfield><subfield code="z">(OCoLC)1257338361</subfield><subfield code="z">(OCoLC)1349301722</subfield><subfield code="z">(OCoLC)1407443984</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5103.2</subfield><subfield code="b">.A435 2006eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">034000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">061000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">621.384</subfield><subfield code="2">22</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aissi, Selim.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2006022273</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security for mobile networks and platforms /</subfield><subfield code="c">Selim Aissi, Nora Dabbous, Anand R. Prasad.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Norwood, MA :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">©2006.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 313 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House universal personal communications series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats.</subfield><subfield code="c">Publisher abstract.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Security for Mobile Networks and Platforms; Contents v; Preface xv; 1 Introduction 1; 2 Authentication, Authorization, and Non-Repudiation 13; 3 Cryptographic Techniques 23; 4 Hardware Security 45; 5 Software Security 67; 6 Security Certification and Evaluation 93; 7 Higher Layer Security 105; 8 IP Layer Security 117; 9 AAA 135; 10 IEEE 802.1X and EAP 149; 11 WPAN Security 163; 12 WLANs Security 177; 13 WMAN 217; 14 WWAN Security 231; 15 Future Security Challenges 245; 16 Mobile Security Threat Catalog 277; List of Acronyms 287; About the Authors 301; Index 303</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Radio.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Mobile & Wireless Communications.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mobile Communication</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Technology, Engineering, Agriculture</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Technologie, Ingenieurswissenschaft, Landwirtschaft</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Technologie, ingénierie et agriculture</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Energy technology & engineering</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Energietechnik, Elektrotechnik und Energiemaschinenbau</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Génie industriel</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electrical engineering</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Elektrotechnik</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electrotechnique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dabbous, Nora.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2006022275</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Prasad, Anand.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2001014054</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Security for mobile networks and platforms (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGRYKGXVvMCqWX9GX33VJC</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Aissi, Selim.</subfield><subfield code="t">Security for mobile networks and platforms.</subfield><subfield code="d">Norwood, MA : Artech House, ©2006</subfield><subfield code="z">159693008X</subfield><subfield code="z">9781596930087</subfield><subfield code="w">(DLC) 2006284848</subfield><subfield code="w">(OCoLC)70997875</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House universal personal communications series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98091836</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=225211</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH28882030</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">225211</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9101096</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2812276</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">securityformobil0000aiss</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn228407058 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:21Z |
institution | BVB |
isbn | 9781596930094 1596930098 |
language | English |
oclc_num | 228407058 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 313 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Artech House, |
record_format | marc |
series | Artech House universal personal communications series. |
series2 | Artech House universal personal communications series |
spelling | Aissi, Selim. http://id.loc.gov/authorities/names/nb2006022273 Security for mobile networks and platforms / Selim Aissi, Nora Dabbous, Anand R. Prasad. Norwood, MA : Artech House, ©2006. 1 online resource (xvi, 313 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Artech House universal personal communications series Includes bibliographical references and index. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Print version record. With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers, architects, and engineers into mobile security specialists. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's security weaknesses and provides comprehensive countermeasures to thwart threats. It explains in language geared for networking professionals the essentials of the latest security standards and protocols. Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. The book's complete catalog of security vulnerabilities ensures that all viable security measures are taken. A practical, hands-on discussion of promising next-generation research into mobile security prepares mobile professionals for the ever-looming next waves of security threats. Publisher abstract. Security for Mobile Networks and Platforms; Contents v; Preface xv; 1 Introduction 1; 2 Authentication, Authorization, and Non-Repudiation 13; 3 Cryptographic Techniques 23; 4 Hardware Security 45; 5 Software Security 67; 6 Security Certification and Evaluation 93; 7 Higher Layer Security 105; 8 IP Layer Security 117; 9 AAA 135; 10 IEEE 802.1X and EAP 149; 11 WPAN Security 163; 12 WLANs Security 177; 13 WMAN 217; 14 WWAN Security 231; 15 Future Security Challenges 245; 16 Mobile Security Threat Catalog 277; List of Acronyms 287; About the Authors 301; Index 303 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh TECHNOLOGY & ENGINEERING Radio. bisacsh TECHNOLOGY & ENGINEERING Mobile & Wireless Communications. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Mobile Communication Technology, Engineering, Agriculture Technologie, Ingenieurswissenschaft, Landwirtschaft Technologie, ingénierie et agriculture Energy technology & engineering Energietechnik, Elektrotechnik und Energiemaschinenbau Génie industriel Electrical engineering Elektrotechnik Electrotechnique Dabbous, Nora. http://id.loc.gov/authorities/names/nb2006022275 Prasad, Anand. http://id.loc.gov/authorities/names/n2001014054 has work: Security for mobile networks and platforms (Text) https://id.oclc.org/worldcat/entity/E39PCGRYKGXVvMCqWX9GX33VJC https://id.oclc.org/worldcat/ontology/hasWork Print version: Aissi, Selim. Security for mobile networks and platforms. Norwood, MA : Artech House, ©2006 159693008X 9781596930087 (DLC) 2006284848 (OCoLC)70997875 Artech House universal personal communications series. http://id.loc.gov/authorities/names/n98091836 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=225211 Volltext |
spellingShingle | Aissi, Selim Security for mobile networks and platforms / Artech House universal personal communications series. Security for Mobile Networks and Platforms; Contents v; Preface xv; 1 Introduction 1; 2 Authentication, Authorization, and Non-Repudiation 13; 3 Cryptographic Techniques 23; 4 Hardware Security 45; 5 Software Security 67; 6 Security Certification and Evaluation 93; 7 Higher Layer Security 105; 8 IP Layer Security 117; 9 AAA 135; 10 IEEE 802.1X and EAP 149; 11 WPAN Security 163; 12 WLANs Security 177; 13 WMAN 217; 14 WWAN Security 231; 15 Future Security Challenges 245; 16 Mobile Security Threat Catalog 277; List of Acronyms 287; About the Authors 301; Index 303 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh TECHNOLOGY & ENGINEERING Radio. bisacsh TECHNOLOGY & ENGINEERING Mobile & Wireless Communications. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 |
title | Security for mobile networks and platforms / |
title_auth | Security for mobile networks and platforms / |
title_exact_search | Security for mobile networks and platforms / |
title_full | Security for mobile networks and platforms / Selim Aissi, Nora Dabbous, Anand R. Prasad. |
title_fullStr | Security for mobile networks and platforms / Selim Aissi, Nora Dabbous, Anand R. Prasad. |
title_full_unstemmed | Security for mobile networks and platforms / Selim Aissi, Nora Dabbous, Anand R. Prasad. |
title_short | Security for mobile networks and platforms / |
title_sort | security for mobile networks and platforms |
topic | Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh TECHNOLOGY & ENGINEERING Radio. bisacsh TECHNOLOGY & ENGINEERING Mobile & Wireless Communications. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast |
topic_facet | Computer networks Security measures. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. TECHNOLOGY & ENGINEERING Radio. TECHNOLOGY & ENGINEERING Mobile & Wireless Communications. COMPUTERS Security General. Computer networks Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=225211 |
work_keys_str_mv | AT aissiselim securityformobilenetworksandplatforms AT dabbousnora securityformobilenetworksandplatforms AT prasadanand securityformobilenetworksandplatforms |