Wireless security

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!Communications engineers need to...

Descripción completa

Detalles Bibliográficos
Otros Autores: Chandra, Praphul (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Amsterdam ; Boston : Newnes/Elsevier c2009.
Edición:1st edition
Colección:Newnes know it all series.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627511806719
Tabla de Contenidos:
  • Front Cover; Wireless Security; Copyright Page; Contents; About the Authors; Part I: Wireless Technology; Chapter 1: Wireless Fundamentals; 1.1 The Wireless Medium; 1.2 Wireless Networking Basics; Chapter 2: Wireless Network Logical Architecture; 2.1 The OSI Network Model; 2.2 Network Layer Technologies; 2.3 Data Link Layer Technologies; 2.4 Physical Layer Technologies; 2.5 Operating System Considerations; 2.6 Summary; Chapter 3: Wireless Network Physical Architecture; 3.1 Wired Network Topologies-A Refresher; 3.2 Wireless Network Topologies; 3.3 Wireless LAN Devices; 3.4 Wireless PAN Devices
  • 3.5 Wireless MAN DevicesChapter 4: Radio Communication Basics; 4.1 Mechanisms of Radio Wave Propagation; 4.2 Open Field Propagation; 4.3 Diffraction; 4.4 Scattering; 4.5 Path Loss; 4.6 Multipath Phenomena; 4.7 Flat Fading; 4.8 Diversity Techniques; 4.9 Noise; 4.10 Communication Protocols and Modulation; 4.11 Summary; References; Chapter 5: Infrared Communication Basics; 5.1 The Ir Spectrum; 5.2 Infrared Propagation and Reception; 5.3 Summary; Chapter 6: Wireless LAN Standards; 6.1 The 802.11 WLAN Standards; 6.2 The 802.11 MAC Layer; 6.3: 802.11 PHY Layer; 6.4: 802.11 Enhancements
  • 6.5 Other WLAN Standards6.6 Summary; Chapter 7: Wireless Sensor Networks; 7.1 Introduction to Wireless Sensor Networks; 7.2 Individual Wireless Sensor Node Architecture; 7.3 Wireless Sensor Networks Architecture; 7.4 Radio Options for the Physical Layer in Wireless Sensor Networks; 7.5 Power Consideration in Wireless Sensor Networks; 7.6 Applications of Wireless Sensor Networks; 7.7 Future Developments; References; Part II: Security Definitions and Concepts; Chapter 8: Attacks and Risks; 8.1 Threats to Personal Privacy; 8.2 Fraud and Theft; 8.3 Internet Fraud; 8.4 Employee Sabotage
  • 8.5 Infrastructure Attacks8.6 Malicious Hackers; 8.7 Malicious Coders; 8.8 Industrial Espionage; 8.9 Social Engineering; Endnotes; Chapter 9: Security Defined; 9.1 What Is Security?; 9.2 What Can We Do?; 9.3 Access Control and the Origins of Computer Security Theory; 9.4 Security Policies; 9.5 Data Integrity and Authentication; 9.6 Recommended Reading; Chapter 10: Standardizing Security; 10.1 Protocol Madness; 10.2 Standardizing Security-A Brief History; 10.3 Standardized Security in Practice; 10.4 Cryptography and Protocols; 10.5 Other Security Protocols; Chapter 11: Secure Sockets Layer
  • 11.1 SSL History11.2 Pesky PKI; 11.3 PKI Alternatives; 11.4 SSL under the Hood; 11.5 The SSL Session; 11.6 SSL in Practice; Chapter 12: Cryptography; 12.1 Do We Need Cryptography?; 12.2 Hashing-Low Security, High Performance; 12.3 To Optimize or Not to Optimize...; 12.4 Choosing Cryptographic Algorithms; 12.5 Tailoring Security for Your Application; Chapter 13: Managing Access; 13.1 Access Control; 13.2 Password Management; Endnotes; Chapter 14: Security and the Law; 14.1 The 1996 National Information Infrastructure Protection Act
  • 14.2 President's Executive Order on Critical Infrastructure Protection