• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Security for Telecommunications Networks » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946600]
• Literatura piękna
 [1856966]

  więcej...
• Turystyka
 [72221]
• Informatyka
 [151456]
• Komiksy
 [35826]
• Encyklopedie
 [23190]
• Dziecięca
 [619653]
• Hobby
 [140543]
• AudioBooki
 [1577]
• Literatura faktu
 [228355]
• Muzyka CD
 [410]
• Słowniki
 [2874]
• Inne
 [445822]
• Kalendarze
 [1744]
• Podręczniki
 [167141]
• Poradniki
 [482898]
• Religia
 [510455]
• Czasopisma
 [526]
• Sport
 [61590]
• Sztuka
 [243598]
• CD, DVD, Video
 [3423]
• Technologie
 [219201]
• Zdrowie
 [101638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2473]
• Puzzle, gry
 [3898]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8170]
Kategorie szczegółowe BISAC

Security for Telecommunications Networks

ISBN-13: 9780387724416 / Angielski / Twarda / 2008 / 192 str.

Patrick McDaniel; Thomas La Porta
Security for Telecommunications Networks Patrick McDaniel Thomas L 9780387724416 Springer - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Security for Telecommunications Networks

ISBN-13: 9780387724416 / Angielski / Twarda / 2008 / 192 str.

Patrick McDaniel; Thomas La Porta
cena 484,18 zł
(netto: 461,12 VAT:  5%)

Najniższa cena z 30 dni: 462,63 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.

Kategorie:
Informatyka, Internet
Kategorie BISAC:
Computers > Security - Network Security
Computers > Computer Science
Computers > Security - General
Wydawca:
Springer
Seria wydawnicza:
Advances in Information Security
Język:
Angielski
ISBN-13:
9780387724416
Rok wydania:
2008
Wydanie:
2008
Numer serii:
000225533
Ilość stron:
192
Waga:
0.45 kg
Wymiary:
23.39 x 15.6 x 1.27
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Wydanie ilustrowane

From the reviews:

"In this book, Traynor et al. reveal some of the vulnerabilities of mobile telephony, and briefly show its foundations in a clear and didactic way. Although average readers could easily understand the initial chapters, readers literate in computers and networks are the intended audience of the book. ... this is a very interesting book, full of valuable content. I would recommend it to everyone interested in the secrets of cellular telephony." (Agusti Solanas, ACM Computing Reviews, January, 2009)

"This book identifies network security problems and vulnerabilities, their underlying causes, and some of their consequences and solutions. ... It addresses the security concerns in cellular networks, which seem to be the most rapidly growing segment of communications throughout the world, especially in fast-growing countries such as Brazil, Russia, India, and China. ... The book will be useful to network engineers, analysts, designers, and researchers interested in investigating cellular network security issues in detail." (Satya Prakash Saraswat, ACM Computing Reviews, October, 2008)

Network Architecture.- Security.- Cellular Architecture.- Vulnerability Analysis.- Vulnerabilities in the Telephony.- Vulnerabilities in the Short Messaging Service (SMS).- Vulnerabilities in Cellular Data Networks.- Vulnerabilities in Voice over IP.- Future Analyses.- Future Directions and Challenges.

Each day, more than two billion people across the globe rely upon telecommunications networks systems as their primary means of connecting to the world around them. This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It is the first book to discuss securing current and next generation telecommunications networks by the security community. The book not only discusses emerging threats and systems vulnerability, but also presents the open questions posed by network evolution and defense mechanisms. It is designed for professionals and researchers in telecommunications. The book is also recommended as a secondary text for graduate-level students in computer science and electrical engineering.

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.

Given the significant focus on securing critical infrastructure in recent years, Security for Telecommunications Networks creates a starting place for new researchers in the field of secure telecommunications networks. This volume not only discusses emerging threats, along with system vulnerability, but also presents the open questions posited by network evolution and defense mechanisms. This is one of the first books to discuss securing current and next generation telecommunications networks by the security community.

Security for Telecommunications Networks is designed for a professional audience composed of practitioners and researchers in industry. This book is also suitable as a secondary text book or reference for advanced-level students in computer science and electrical engineering.

 



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia