Security for Mobile Networks and Platforms (Artech House Universal Personal Communications) (Hardcover)
Selim Aissi, Nora Dabbous, Dr Anand R Prasad
- 出版商: Artech House Publish
- 出版日期: 2006-09-06
- 售價: $5,010
- 貴賓價: 9.5 折 $4,760
- 語言: 英文
- 頁數: 332
- 裝訂: Hardcover
- ISBN: 159693008X
- ISBN-13: 9781596930087
-
相關分類:
資訊安全
無法訂購
買這商品的人也買了...
-
$650$553 -
$880$748 -
$780$702 -
$650$507 -
$620$484 -
$1,881Advanced Wireless Communications: 4G Cognitive and Cooperative Broadband Technologies, 2/e
-
$450$383 -
$980$774 -
$520$406 -
$680$537 -
$1,912Trusted Platform Module Basics: Using TPM in Embedded Systems
-
$580$522 -
$490$382 -
$580$452 -
$680$578 -
$580$522 -
$399Hacking Exposed Wireless
-
$620$490 -
$1,200$948 -
$1,240Developing Practical Wireless Applications (Paperback)
-
$850Wireless Networking Technology: From Principles to Successful Implementation
-
$5,530$5,254 -
$2,548Security for Wireless Ad Hoc Networks
-
$360$306 -
$680$530
相關主題
商品描述
Description
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern in the mobile communications industry. Helping you become a mobile security specialist, this timely resource explains the essentials of the latest security standards and protocols. Covering each type of mobile technology from WiFi to Bluetooth, the book details each technology's weaknesses and provides you with comprehensive countermeasures.
Most importantly, the book pinpoints security issues encountered end-to-end throughout an entire mobile network. You find a complete catalog of security vulnerabilities to ensure that every security measure is taken. Moreover, this forward-looking reference includes a practical, hands-on discussion of promising next-generation research into mobile security that helps prepare you for the ever-looming next waves of security threats.
Table of Contents
Introduction.
Authentication, Authorization, and Non-Repudiation ?Authentication. Authorization. Non-Repudiation.
Cryptographic Techniques ?3.1GSM Algorithms. 3.23GPP Algorithms. 3.3Bluetooth. 3.4802.11.
Hardware Security ?Threats Addressed by Hardware.
Software Security ?The New Risks. Elements of Mobile Security. Communication Software Security. Operating System Security. Web Services Security. Content Protection. Managed Runtime Security. Access Control.
Security Certification and Evaluation ?Security Certification Schemes. Privacy Aspects.
Higher Layer Security ?SSL and TLS Protocols. Other Higher Layer Protocols. Known Issues and Possible Solutions. Security in WAP.
IP Layer Security ?AH and ESP. Key Management. IP Address Translation. VPN. Mobile IP and IPSec.
AAA ?AAA Basics. AAA Protocols. Mobile IP and AAA. WISPr. AAA in Mobile Systems.
IEEE 802.1X and EAP ?IEEE 802.1x. Extensible Authentication Protocol.
WPAN Security ?Bluetooth. Other Emerging WPAN Technologies.
WLAN Security ?Security in IEEE 802.11. IEEE 802.11 Security Issues. Countermeasures. WPA and IEEE 802.11i RSN. Secure WLAN Deployment.
WMAN Security ?IEEE 802.16: an Introduction. IEEE 802.16-2004 Security. PKM Security Issues. PKMv2.
WWAN Security ?GSM Security. 3GPP Security.
Future Security Challenges ?The Need for Future Generation Communications. Defining the Future. Technologies. Other Technologies. Future Development: Protocol Layers and Technologies. Wireless Standards Activities towards the Future. Standardization and Regulations. Mobile Networks Security Issues. Mobile Platforms Security Issues.
Mobile Security Threat Catalog ?Software Threats. Hardware Threats. Network Threats. Protections Means.
Index. List of Abbreviations and Symbols. Biographies.