menu
{ "item_title" : "Security for Multihop Wireless Networks", "item_author" : [" Shafiullah Khan", "Jaime Lloret Mauri "], "item_description" : "This book provides broad coverage of the security issues facing multihop wireless networks, including mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes for securing today's networks, it includes coverage of cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and outlines proven methods for strengthening security mechanisms in each layer. ", "item_img_path" : "https://covers4.booksamillion.com/covers/bam/1/13/803/393/1138033936_b.jpg", "price_data" : { "retail_price" : "70.99", "online_price" : "70.99", "our_price" : "70.99", "club_price" : "70.99", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Security for Multihop Wireless Networks|Shafiullah Khan

Security for Multihop Wireless Networks

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

This book provides broad coverage of the security issues facing multihop wireless networks, including mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes for securing today's networks, it includes coverage of cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and outlines proven methods for strengthening security mechanisms in each layer.

This item is Non-Returnable

Details

  • ISBN-13: 9781138033931
  • ISBN-10: 1138033936
  • Publisher: CRC Press
  • Publish Date: November 2016
  • Dimensions: 9.21 x 6.14 x 1.09 inches
  • Shipping Weight: 1.65 pounds
  • Page Count: 538

Related Categories

You May Also Like...

    1

BAM Customer Reviews