Security in Wireless Ad Hoc and Sensor Networks

本书深入探讨了无线自组网及传感器网络的安全问题,涵盖了基础概念、安全攻击及对策等内容。针对无线自组网、传感器网络及网格网络的安全威胁进行了详细分析,并讨论了相关标准。
版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。 http://blog.youkuaiyun.com/topmvp - topmvp
  Channel
 Data Warehouse Sql Language
 ACCESS FileMaker
 Data Mining Database Design
 Database General MySql
 Oracle SQL Server 2005
 SQL Server 2008 DB2
 Sql Server Windows 2003
 Windows Server 2008 Linux
 Windows Unix
 Windows Vista OS General
 Flash Flex
 3D Animation PhotoShop
 SCM Project
 Software Test Object Oriented
 MDA CMM CMMI ISO
 UML Service Oriented
 Patterns Extreme Programming
 Requirement Aspect Oriented
 Six Sigma Excel
 SAP Google
 Apple Exchange Server
 VPN Wireless
 IPv6 VoIP
 Mobile C C++
 Spring Ado.Net
 Programming General Dot Net
 COM DCOM Vb Vb.Net
 C# CSharp Hibernate
 Java Delphi
 Eclipse Swing
 J2ME DirectX
 Algorithms OpenGL
 Visual Studio Web Services
 J2EE Crystal Reports
 JDBC WebLogic
 Grid Computing WPF
 Jakarta DreamWeaver
 Apache Asp
 Web Design Adobe AIR
 Web General Asp.Net
 HTML JSP
 Java Script SharePoint
 VBScript Ajax
 Python Ruby
 Perl CSS
 XML XSLT PHP
 Game Programming Game General
 
Security in Wireless Ad Hoc and Sensor Networks
[LanguageEnglish ] [Channel: Wireless ] 
<script type="text/javascript" src="http://pagead2.googlesyndication.com/pagead/show_ads.js"> </script>
This book provides an in-depth guide to security in wireless ad hoc and sensor networks
Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and counter measures in wireless ad hoc, sensor and mesh networks, and briefly presents the standards on related topics. The authors offer a clear exposition of various challenges and solutions in this field including bootstrapping, key distribution and exchange, authentication issues, privacy, anonymity and tamper resilience.
Key Features:
*Introduces the fundamentals and key issues of the new technologies followed by comprehensive presentation on security attacks and counter measures
*Covers Denial of Service (DoS) attacks, hardware aspects of secure wireless ad hoc and sensor networks and secure routing
*Contains information on cryptographic primitives and electronic warfare
*Includes problems at the end of each chapter to enhance learning.
This book is well suited for graduate students in computer, electrical and communications engineering and computer science departments, researchers in academia and industry, as well as C4I engineers and officers in the military. Wireless network designers for internet service providers and mobile communications operators will also find this book very useful.

http://rapidshare.com/files/231599810/0470027487.rar
http://depositfiles.com/files/epb7mea7k
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值