Wireless Internet Security: Architecture and Protocols
2009-04-26 23:41
330 查看
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。http://blog.csdn.net/topmvp - topmvp
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems. Kempf also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, security threats, functional architecture, and the important internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry. http://rapidshare.com/files/199114314/0521887836.rar http://depositfiles.com/files/ke6fnmlmh
In describing tools for internet security, this title focuses on understanding the system architecture of existing security and on developing architectural changes for new security services. Topics include security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems. Kempf also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, security threats, functional architecture, and the important internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry. http://rapidshare.com/files/199114314/0521887836.rar http://depositfiles.com/files/ke6fnmlmh
相关文章推荐
- Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security [ILLUSTRATED
- Security and Quality of Service in Ad Hoc Wireless Networks
- 《Computer Networking - Protocols in Aciton》读书笔记之Section 4.1: Joining the Internet: Introduction to IP and DHCP
- Unlicensed Mobile Access Technology: Protocols, Architectures, Security, Standards and Applications
- Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks
- Internet History, Technology and Security (Week5.1)
- Remove Kaspersky Internet Security 2009 and/ or 2010 Enhanced Protection Mode
- Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
- DFS security warning and use group policy to set up internet security zones
- Lockdown:Towards a Safe and Practical Architecture for Security Applications 研读
- Security and System Architecture: Comparison of Android Customizations 阅读笔记
- Internet History, Technology and Security (Week6)
- 推荐:Microsoft Internet Security and Acceleration (ISA) Server 2006 支持更新
- Remove Microsoft Defender and Kaspersky Internet Security 2011 Enhanced Protection Mode Sham
- Wireless Ad hoc and Sensor Networks: Protocols, Performance, and Control