|
|
|
|
LEADER |
02405nmm a2200457 u 4500 |
001 |
EB002066760 |
003 |
EBX01000000000000001206850 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220922 ||| eng |
020 |
|
|
|a 9781439896266
|
020 |
|
|
|a 1439896267
|
050 |
|
4 |
|a TK5103.2
|
100 |
1 |
|
|a Osterhage, Wolfgang
|
245 |
0 |
0 |
|a Wireless security
|c Wolfgang Osterhage
|
260 |
|
|
|a Boca Raton, Fla.
|b CRC Press
|c 2011
|
300 |
|
|
|a xvii, 212 pages
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a 1. Introduction -- 2. WLAN -- 3. PDAs -- 4. Mobile phones -- 5. Bluetooth -- 6. Infrared -- 7. Security policy
|
653 |
|
|
|a COMPUTERS / Internet / Security / bisacsh
|
653 |
|
|
|a COMPUTERS / Networking / Security / bisacsh
|
653 |
|
|
|a Réseaux locaux sans fil / Sécurité / Mesures
|
653 |
|
|
|a Wireless LANs / Security measures / fast
|
653 |
|
|
|a Wireless LANs / Security measures
|
653 |
|
|
|a Transmission sans fil / Sécurité / Mesures
|
653 |
|
|
|a Radiocommunications mobiles / Sécurité / Mesures
|
653 |
|
|
|a Mobile communication systems / Security measures
|
653 |
|
|
|a Wireless communication systems / Security measures / fast
|
653 |
|
|
|a Wireless communication systems / Security measures
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 1578087686
|
776 |
|
|
|z 9781439896266
|
776 |
|
|
|z 9781578087686
|
776 |
|
|
|z 1439896267
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781578087686/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a IntroductionWLANWLAN Basic PrinciplesIEEE 802.11 OverviewWireless FidelityWMANKey TerminologyArchitecture and ComponentsSecurity RequirementsRecent DevelopmentsApplicationsChecklistPDAsOther Wireless TechnologiesHardware ComponentsStandardsConfigurationSecurity AspectsChecklistMobile PhonesContextBasic PrinciplesOperating SystemsServicesMobile Phones and WLANThreats and ProtectionSpecial Case BlackberriesSmart PhonesSecurity CheckDirectiveChecklistBluetoothIntroductionTechnical BasicsConfigurationSecurity AspectsThe FutureChecklistInfra RedBackgroundIrDAApplicationsSecurity AspectsChecklistSecurity PolicyIntroductionScopeInformation and Communication SecurityPhysical SecurityDocumentationWireless SecuritySummary
|