Handbook of Wireless Local Area Networks: Applications, Technology, Security, and StandardsMohammad Ilyas, Syed A. Ahson CRC Press, 25 de mai. de 2005 - 664 páginas Consisting of 25 articles contributed by expert authors from around the world, this handbook begins with a detailed introduction that provides an overview of LAN technologies, performance, security, and security protocols. It then delves further into WLAN technology, covering space-time processing, WLAN and cellular convergence, and a peer-to-peer approach to roaming, along with other topics. The Handbook continues by exploring WLAN applications, followed by an extensive discussion of security that includes the steps that can be taken to minimize WLAN security risks. This text concludes with an analysis of standards, describing 3G UMTS - IEEE 802.11b internetworking and security. |
Outras edições - Ver todos
Handbook of Wireless Local Area Networks: Applications, Technology, Security ... Mohammad Ilyas,Syed A. Ahson Visualização parcial - 2005 |
Handbook of Wireless Local Area Networks: Applications, Technology, Security ... Mohammad Ilyas,Syed A. Ahson Prévia não disponível - 2005 |
Termos e frases comuns
access point addition algorithm allows applications approach architecture attacks authentication bits Bluetooth called cellular changes channel ciphertext client collision communication Computer configuration connection considered contention data frame defined described devices discussed distributed domain effective encryption example existing field Figure frame function host IEEE implementation improve increase infrastructure initialization integrity interface Internet issues layer mechanism medium method mobile mobile device mode multiple nodes operation P2PWNC packet patient performance physical possible present problem proposed protection protocol radio range receipts receiver Reference request result routing scenario scheme secret sends sequence server shared signal solutions specific standard station traffic transmission transmitted types UMTS vulnerabilities wired wireless networks WLAN