• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures

ISBN-13: 9783642406454 / Angielski / Miękka / 2013 / 93 str.

Keijo Haataja;Konstantin Hyppönen;Sanna Pasanen
Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures Keijo Haataja, Konstantin Hyppönen, Sanna Pasanen, Pekka Toivanen 9783642406454 Springer-Verlag Berlin and Heidelberg GmbH &  - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Bluetooth Security Attacks: Comparative Analysis, Attacks, and Countermeasures

ISBN-13: 9783642406454 / Angielski / Miękka / 2013 / 93 str.

Keijo Haataja;Konstantin Hyppönen;Sanna Pasanen
cena 242,07
(netto: 230,54 VAT:  5%)

Najniższa cena z 30 dni: 231,29
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Information Theory
Computers > Security - General
Computers > Networking - Hardware
Wydawca:
Springer-Verlag Berlin and Heidelberg GmbH &
Seria wydawnicza:
SpringerBriefs in Computer Science
Język:
Angielski
ISBN-13:
9783642406454
Rok wydania:
2013
Dostępne języki:
Angielski
Wydanie:
2013
Numer serii:
000444178
Ilość stron:
93
Waga:
1.71 kg
Wymiary:
23.523.5 x 15.5
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Chap. 1 - Introduction.- Chap. 2 - Overview of Bluetooth Security.- Chap. 3 - Bluetooth Network Vulnerabilities.- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks.- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth.- Chap. 6 - Countermeasures.- Chap. 7 - New Practical Attack.- Chap. 8 - Conclusion and Future Work References.

Dr. Keijo Haataja received his Ph.Lic. in 2007 and his Ph.D. in 2009 in Computer Science from the University of Eastern Finland (UEF), where he has been a senior assistant professor of wireless communications and data security since 2002. He is a member of the Bluetooth Security Expert Group (SEG), which works to identify threats to Bluetooth wireless security and to develop related specification enhancements, white papers, test cases, and test tools. He has also been a technical consultant to Unicta Oy since 2008. His main research interests include wireless communications, wireless security, mobile systems, sensor networks, data communications, computational intelligence, and intelligent autonomous robots.

Dr. Konstantin Hyppönen received his Ph.D. in Computer Science in 2009 from the University of Kuopio. He has lectured on data security and software engineering. He works in the Finnish Social Insurance Institution (Kela), and participates in a number of national and European projects focusing on semantic operability and the security of eHealth services.

Ms. Sanna Pasanen received her M.Sc. in 2009 in Computer Science from UEF and her B.Eng. in 2013 in ICT/Telecommunications from the Helsinki Metropolia University of Applied Sciences. She works in the telecommunications and data networks team in IBM. Her main research interests include cloud services, unified communications, VoIP, and wireless networks.

Prof. Pekka Toivanen received his M.Sc. (Tech.) degree at Helsinki University of Technology in 1989 and D.Sc. (Tech.) degree in 1996 at Lappeenranta University of Technology. He has been a full professor in computational intelligence at UEF since 2007. He has published more than 100 reviewed research articles in international conferences and journals, and has served on many conference committees and editorial boards. His areas of interest are computational intelligence, image processing, machine vision, and the compression of spectral images.

Bluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions.

The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices.



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia