21.07.2013 Views

uuauu 008 100210s2009 nyua fob 001 0 eng - McGraw-Hill ...

uuauu 008 100210s2009 nyua fob 001 0 eng - McGraw-Hill ...

uuauu 008 100210s2009 nyua fob 001 0 eng - McGraw-Hill ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

000 02688cam 2200637 a 4500<br />

<strong>001</strong> ccn00214111<br />

006 m f d<br />

007 cr cn ---<strong>uuauu</strong><br />

<strong>008</strong> 070416s2002 <strong>nyua</strong> <strong>fob</strong>f <strong>001</strong> 0 <strong>eng</strong> d<br />

010 $z 2002282223<br />

020 $a0071449760<br />

020 $z0071380388 (print)<br />

035 $a(Sirsi) a214111<br />

050 4$aTK5102.85$b.N53 2002<br />

082 04$a005.8$221<br />

100 1 $aNichols, Randall K.<br />

245 10$aWireless security$h[electronic resource] :$bmodels, threats, and solutions /$cRandall K.<br />

Nichols, Panos C. Lekkas.<br />

260 $aNew York :$b<strong>McGraw</strong>-<strong>Hill</strong>,$c[2002]<br />

300 $a1 electronic text (xliii, 657 p.) :$bill.<br />

490 1 $a<strong>McGraw</strong>-<strong>Hill</strong>'s AccessEngineering<br />

588 $aDescription based on cover image and table of contents, viewed on April 16, 2007.<br />

500 $aPrint version c2002.<br />

504 $aIncludes bibliographical references (p. 595-638) and index.<br />

505 0 $auhttp://www.loc.gov/catdir/toc/mh023/2002282223.html<br />

530 $aAlso issued in print and PDF version.<br />

545 0 $aContributor biographical information$uhttp://www.loc.gov/catdir/bios/mh041/2002282223.html<br />

650 0$aWireless communication systems$xSecurity measures.<br />

650 0$aComputer security.<br />

650 0$aComputer networks$xSecurity measures.<br />

650 0$aInformation warfare.<br />

650 0$aCyberterrorism$xPrevention.<br />

650 0$aCryptography.<br />

650 0$aInternet telephony$xSecurity measures.<br />

650 0$aWireless LANS$xSecurity measures.<br />

650 0$aArtificial satellites in telecommunications.<br />

650 0$aComputers$xAccess control.<br />

655 0$aElectronic books.<br />

655 0$aInternet resources.<br />

700 1 $aLekkas, Panos C.<br />

740 02$aWhy is wireless different.<br />

740 02$aWireless information warfare.<br />

740 02$aTelephone system vulnerabilities.<br />

740 02$aSatellite communications.<br />

740 02$aCryptographic security.<br />

740 02$aSpeech cryptology.<br />

740 02$aWireless local area network (WLAN).<br />

740 02$aWireless application protocol (WAP).<br />

740 02$aWireless transport layer security (WTLS).<br />

740 02$aBluetooth.<br />

740 02$aVoice over internet protocol.<br />

740 02$aHardware perspectives for end-to-end security (E2E) in wireless applications.<br />

740 02$aOptimizing wireless security with FPGAs and ASICs.<br />

830 0$a<strong>McGraw</strong>-<strong>Hill</strong>'s AccessEngineering.<br />

856 40$uhttp://access<strong>eng</strong>ineeringlibrary.com/browse/wireless-security-models-threats-andsolutions$zSubscription<br />

required<br />

949 $aTK 5102.85 .N53$wLC$c1$i214111-2<strong>001</strong>$d1/2/2012$lMAIN$mMGH$q6$rY$sY$tWEB$u4/16/2007$xENG$zN-<br />

US<br />

997 $a(c)2007 Cassidy Cataloguing Services, Inc.<br />

000 03051cam 2200793 a 4500<br />

<strong>001</strong> ccn00214198<br />

006 m f d<br />

007 cr cn ---<strong>uuauu</strong><br />

<strong>008</strong> 070423s2006 <strong>nyua</strong> fsf 000 0 <strong>eng</strong> d<br />

010 $z 2007273025<br />

020 $z9780071455398 (print)<br />

020 $z0071455396 (print)<br />

020 $a0071490175

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!