Wireless network security theories and applications = 无线网络安全 理论与应用 (英文版) 🔍
陈磊,季家凰,张自洪主编, 陈磊, 季家凰, 张自洪[主编, 张自洪, Ji jia huang, Zhang zi hong, 陈磊, 季家凰, CHEN LEI . JI JIA HUANG . ZHANG ZI HONG, Lei Chen, Jiahuang Ji, Zihong Zhang
北京:高等教育出版社, 2013, 2013
英语 [en] · 中文 [zh] · PDF · 79.2MB · 2013 · 📗 未知类型的图书 · 🚀/duxiu/zlibzh · Save
描述
Wireless Network Security Theories and Applications discusses the relevant security technologies, vulnerabilities, and potential threats, and introduces the corresponding security standards and protocols, as well as provides solutions to security concerns. Authors of each chapter in this book, mostly top researchers in relevant research fields in the U.S. and China, presented their research findings and results about the security of the following types of wireless networks: Wireless Cellular Networks, Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), Bluetooth Networks and Communications, Vehicular Ad Hoc Networks (VANETs), Wireless Sensor Networks (WSNs), Wireless Mesh Networks (WMNs), and Radio Frequency Identification (RFID). The audience of this book may include professors, researchers, graduate students, and professionals in the areas of Wireless Networks, Network Security and Information Security, Information Privacy and Assurance, as well as Digital Forensics. Lei Chen is an Assistant Professor at Sam Houston State University, USA; Jiahuang Ji is an Associate Professor at Sam Houston State University, USA; Zihong Zhang is a Sr. software engineer at Jacobs Technology, USA under NASA contract.
备用文件名
duxiu/initial_release/《无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版》_13327779.zip
备用文件名
zlibzh/no-category/陈磊,季家凰,张自洪主编, 陈磊, 季家凰, 张自洪[主编, 张自洪, Ji jia huang, Zhang zi hong, 陈磊, 季家凰, CHEN LEI . JI JIA HUANG . ZHANG ZI HONG, Lei Chen, Jiahuang Ji, Zihong Zhang/无线网络安全 理论与应用 英文版_30486472.pdf
备选标题
Wireless Network Security Theories and Applications(Chinese Edition)
备选作者
Lei Chen; Jiahuang Ji; Zihong Zhang; SpringerLink (Online service)
备用出版商
Spektrum Akademischer Verlag. in Springer-Verlag GmbH
备用出版商
Springer Berlin Heidelberg : Imprint : Springer
备用出版商
Steinkopff. in Springer-Verlag GmbH
备用出版商
Springer London, Limited
备用出版商
Higher Education Press
备用出版商
Springer Nature
备用版本
Xin yi dai xin xi ke xue yu ji zhu cong shu, Bei jing, 2013
备用版本
China, People's Republic, China
备用版本
Springer Nature, Beijing, 2013
备用版本
Berlin, Heidelberg, 2013
备用版本
Germany, Germany
备用版本
2, 20130823
元数据中的注释
Bookmarks: p1 (p1): Chapter 1 Applications,Technologies,and Standards in Secure Wireless NetWorks and Communications
p1-1 (p1): Lei Chen
p1-2 (p1): 1.1 Introduction
p1-3 (p3): 1.2 Overview of Security in Cellular Networks and Communications
p1-4 (p3): 1.3 Overview of Security in WLANs
p1-5 (p4): 1.4 Overview of Security in WMANs
p1-6 (p5): 1.5 Overview of Security in Bluetooth Networks and Communications
p1-7 (p5): 1.6 Overview of Security in VANETs
p1-8 (p6): 1.7 Overview of Security in WSNs
p1-9 (p6): 1.8 Overview of Security in WMNs
p1-10 (p7): 1.9 Overview of Security in RFID Networks and Communications
p1-11 (p7): 1.10 Summary
p1-12 (p8): References
p2 (p9): Chapter 2 Security in Cellular NetWorks and Communications
p2-1 (p10): Chuan-Kun Wu
p2-2 (p10): 2.1 Introduction
p2-3 (p12): 2.2 Security architecture of cellular communication networks
p2-4 (p14): 2.3 Security techniques in GSM networks
p2-5 (p22): 2.4 Security techniques in 3G networks
p2-6 (p25): 2.5 Security techniques in LTE networks
p2-7 (p33): 2.6 Security issues in femtocell
p2-8 (p34): 2.7 Privacy issues in cellular networks
p2-9 (p35): 2.8 Security issues of mobile devices
p2-10 (p35): 2.9 Concluding remarks
p2-11 (p36): References
p3 (p39): Chapter 3 Security in Wireless Local Area NetWorks
p3-1 (p39): Chao Yang and Guofei Gu
p3-2 (p39): 3.1 Introduction to WLAN
p3-3 (p42): 3.2 Current State of WLAN Security
p3-4 (p46): 3.3 WLAN Communication Security
p3-5 (p53): 3.4 WLAN Access Point Security
p3-6 (p55): 3.5 Other WLAN Security Issues
p3-7 (p56): 3.6 Conclusion
p3-8 (p56): References
p4 (p59): Chapter 4 Security in Wireless Metropolitan Area NetWorks
p4-1 (p60): Lei Chen,Narasimha Shashidhar,Shengli Yuan,and Ming Yang
p4-2 (p60): 4.1 Introduction
p4-3 (p61): 4.2 Fundamentals of WiMAX
p4-4 (p63): 4.3 WiMAX security goals and solutions
p4-5 (p72): 4.4 WiMAX security Vulnerabilities,threats,and countermeasures
p4-6 (p73): 4.5 Summary
p4-7 (p74): References
p5 (p77): Chapter 5 Security in Bluetooth NetWorks and Communications
p5-1 (p77): Lei Chen,Peter Cooper,and Qingzhong Liu
p5-2 (p77): 5.1 Introduction
p5-3 (p78): 5.2 Bluetooth Primer
p5-4 (p82): 5.3 Bluetooth Security Solutions
p5-5 (p90): 5.4 Bluetooth Security Vulnerabilities,Threats,and Countermeasures
p5-6 (p92): 5.5 Conclusion
p5-7 (p93): References
p6 (p95): Chapter 6 Security in Vehicular Ad Hoc NetWorks(VANETs)
p6-1 (p95): Weidong Yang
p6-2 (p95): 6.1 Introduction
p6-3 (p101): 6.2 Security Architecture Framework for Vehicular Ad Hoc Networks
p6-4 (p115): 6.3 Secure Communication protocols for Vehicular Ad Hoc Network
p6-5 (p120): 6.4 Privacy Enhancing and Secure Positioning
p6-6 (p126): 6.5 Conclusion
p6-7 (p127): References
p7 (p129): Chapter 7 Security in Wireless Sensor NetWorks
p7-1 (p129): Weiping Wang,Shigeng Zhang.Guihua Duan,and Hong Song
p7-2 (p129): 7.1 Introduction
p7-3 (p131): 7.2 Key management in WSNs
p7-4 (p144): 7.3 Secure routing protocols in WSNs
p7-5 (p153): 7.4 Location privacy protections in WSNs
p7-6 (p161): 7.5 Secure data aggregation
p7-7 (p172): 7.6 Conclusion
p7-8 (p172): References
p8 (p179): Chapter 8 Security in Wireless Sensor NetWorks
p8-1 (p179): Ping Li,Limin Sun,Xiangyan Fu,and Lin Ning
p8-2 (p179): 8.1 Introduction
p8-3 (p181): 8.2 Overview of security architecture for WSN
p8-4 (p189): 8.3 Cryptographic Approaches
p8-5 (p195): 8.4 Resilience on Key Management
p8-6 (p200): 8.5 Tust Management
p8-7 (p214): 8.6 Location Privacy
p8-8 (p220): 8.7 Conclusion
p8-9 (p221): References
p9 (p229): Chapter 9 Security in Wireless Mesh NetWorks
p9-1 (p229): Chung-wei Lee
p9-2 (p229): 9.1 Introduction
p9-3 (p231): 9.2 Wireless Mesh Networks(WMN)Characteristics
p9-4 (p234): 9.3 WMN Security Vulnerabilities
p9-5 (p236): 9.4 WMN Defense Mechanisms
p9-6 (p243): 9.5 WMN Security Standards and Products
p9-7 (p244): 9.6 Conclusion
p9-8 (p244): References
p10 (p247): Chapter 10 Security in RFID Networks and Communications
p10-1 (p247): Chiu C.Tan and Jie Wu
p10-2 (p247): 10.1 Introduction
p10-3 (p248): 10.2 RFID Network Primer
p10-4 (p252): 10.3 Security Requirements
p10-5 (p253): 10.4 Hardware Based Solutions
p10-6 (p254): 10.5 Basic Protocol Based Solutions
p10-7 (p258): 10.6 Advance Protocol Based Solutions
p10-8 (p260): 10.7 Commercial RFID Security
p10-9 (p264): 10.8 Conclusion
p10-10 (p265): References
p11 (p269): Index
p1-1 (p1): Lei Chen
p1-2 (p1): 1.1 Introduction
p1-3 (p3): 1.2 Overview of Security in Cellular Networks and Communications
p1-4 (p3): 1.3 Overview of Security in WLANs
p1-5 (p4): 1.4 Overview of Security in WMANs
p1-6 (p5): 1.5 Overview of Security in Bluetooth Networks and Communications
p1-7 (p5): 1.6 Overview of Security in VANETs
p1-8 (p6): 1.7 Overview of Security in WSNs
p1-9 (p6): 1.8 Overview of Security in WMNs
p1-10 (p7): 1.9 Overview of Security in RFID Networks and Communications
p1-11 (p7): 1.10 Summary
p1-12 (p8): References
p2 (p9): Chapter 2 Security in Cellular NetWorks and Communications
p2-1 (p10): Chuan-Kun Wu
p2-2 (p10): 2.1 Introduction
p2-3 (p12): 2.2 Security architecture of cellular communication networks
p2-4 (p14): 2.3 Security techniques in GSM networks
p2-5 (p22): 2.4 Security techniques in 3G networks
p2-6 (p25): 2.5 Security techniques in LTE networks
p2-7 (p33): 2.6 Security issues in femtocell
p2-8 (p34): 2.7 Privacy issues in cellular networks
p2-9 (p35): 2.8 Security issues of mobile devices
p2-10 (p35): 2.9 Concluding remarks
p2-11 (p36): References
p3 (p39): Chapter 3 Security in Wireless Local Area NetWorks
p3-1 (p39): Chao Yang and Guofei Gu
p3-2 (p39): 3.1 Introduction to WLAN
p3-3 (p42): 3.2 Current State of WLAN Security
p3-4 (p46): 3.3 WLAN Communication Security
p3-5 (p53): 3.4 WLAN Access Point Security
p3-6 (p55): 3.5 Other WLAN Security Issues
p3-7 (p56): 3.6 Conclusion
p3-8 (p56): References
p4 (p59): Chapter 4 Security in Wireless Metropolitan Area NetWorks
p4-1 (p60): Lei Chen,Narasimha Shashidhar,Shengli Yuan,and Ming Yang
p4-2 (p60): 4.1 Introduction
p4-3 (p61): 4.2 Fundamentals of WiMAX
p4-4 (p63): 4.3 WiMAX security goals and solutions
p4-5 (p72): 4.4 WiMAX security Vulnerabilities,threats,and countermeasures
p4-6 (p73): 4.5 Summary
p4-7 (p74): References
p5 (p77): Chapter 5 Security in Bluetooth NetWorks and Communications
p5-1 (p77): Lei Chen,Peter Cooper,and Qingzhong Liu
p5-2 (p77): 5.1 Introduction
p5-3 (p78): 5.2 Bluetooth Primer
p5-4 (p82): 5.3 Bluetooth Security Solutions
p5-5 (p90): 5.4 Bluetooth Security Vulnerabilities,Threats,and Countermeasures
p5-6 (p92): 5.5 Conclusion
p5-7 (p93): References
p6 (p95): Chapter 6 Security in Vehicular Ad Hoc NetWorks(VANETs)
p6-1 (p95): Weidong Yang
p6-2 (p95): 6.1 Introduction
p6-3 (p101): 6.2 Security Architecture Framework for Vehicular Ad Hoc Networks
p6-4 (p115): 6.3 Secure Communication protocols for Vehicular Ad Hoc Network
p6-5 (p120): 6.4 Privacy Enhancing and Secure Positioning
p6-6 (p126): 6.5 Conclusion
p6-7 (p127): References
p7 (p129): Chapter 7 Security in Wireless Sensor NetWorks
p7-1 (p129): Weiping Wang,Shigeng Zhang.Guihua Duan,and Hong Song
p7-2 (p129): 7.1 Introduction
p7-3 (p131): 7.2 Key management in WSNs
p7-4 (p144): 7.3 Secure routing protocols in WSNs
p7-5 (p153): 7.4 Location privacy protections in WSNs
p7-6 (p161): 7.5 Secure data aggregation
p7-7 (p172): 7.6 Conclusion
p7-8 (p172): References
p8 (p179): Chapter 8 Security in Wireless Sensor NetWorks
p8-1 (p179): Ping Li,Limin Sun,Xiangyan Fu,and Lin Ning
p8-2 (p179): 8.1 Introduction
p8-3 (p181): 8.2 Overview of security architecture for WSN
p8-4 (p189): 8.3 Cryptographic Approaches
p8-5 (p195): 8.4 Resilience on Key Management
p8-6 (p200): 8.5 Tust Management
p8-7 (p214): 8.6 Location Privacy
p8-8 (p220): 8.7 Conclusion
p8-9 (p221): References
p9 (p229): Chapter 9 Security in Wireless Mesh NetWorks
p9-1 (p229): Chung-wei Lee
p9-2 (p229): 9.1 Introduction
p9-3 (p231): 9.2 Wireless Mesh Networks(WMN)Characteristics
p9-4 (p234): 9.3 WMN Security Vulnerabilities
p9-5 (p236): 9.4 WMN Defense Mechanisms
p9-6 (p243): 9.5 WMN Security Standards and Products
p9-7 (p244): 9.6 Conclusion
p9-8 (p244): References
p10 (p247): Chapter 10 Security in RFID Networks and Communications
p10-1 (p247): Chiu C.Tan and Jie Wu
p10-2 (p247): 10.1 Introduction
p10-3 (p248): 10.2 RFID Network Primer
p10-4 (p252): 10.3 Security Requirements
p10-5 (p253): 10.4 Hardware Based Solutions
p10-6 (p254): 10.5 Basic Protocol Based Solutions
p10-7 (p258): 10.6 Advance Protocol Based Solutions
p10-8 (p260): 10.7 Commercial RFID Security
p10-9 (p264): 10.8 Conclusion
p10-10 (p265): References
p11 (p269): Index
元数据中的注释
related_files:
filepath:《无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版》_13327779.zip — md5:ad1cac35c5e789f411774c1e3667fd97 — filesize:70720629
filepath:《无线网络安全--理论与应用=WIRELESS-NETWORK-SECURITY-THEORIES-AND-APPLICATIONS--英文版》_13327779.zip — md5:92d0eae971bffe7f3fdf80fc5fcb9ba5 — filesize:70614603
filepath:《无线网络安全--理论与应用=WIRELESS-NETWORK-SECURITY-THEORIES-AND-APPLICATIONS--英文版》_13327779.zip — md5:86783fe9db7cb93b28453d4ec1e27288 — filesize:70614603
filepath:《无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版》_13327779.zip — md5:273226166be7bd5fac706bec23aaab59 — filesize:70692108
filepath:无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版_13327779.zip — md5:e323e1d04b4a538623b838f687a0b604 — filesize:70821981
filepath:/读秀/读秀4.0/读秀/4.0/数据库18-3/《无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版》_13327779.zip
filepath:13c/zjk-贵财0109/《无线网络安全--理论与应用=WIRELESS-NETWORK-SECURITY-THEORIES-AND-APPLICATIONS--英文版》_13327779.zip
filepath:无线网络安全 理论与应用_13327779.zip — md5:a4055fcc35735e5b9af406cce69bfb1f — filesize:70473471
filepath:无线网络安全 理论与应用_13327779.zip — md5:af0b126eb9e697de2a073581190a8657 — filesize:70473471
filepath:13327779.rar — md5:244f096dbca6586de99d281795cbc493 — filesize:70586588
filepath:13327779.zip — md5:c4c4cc932kb761da3744b8f098dc81f1 — filesize:70720629
filepath:843_28_2b/淮阴师范63/无线网络安全 理论与应用_13327779.zip
filepath:21a/淮阴师范63/无线网络安全 理论与应用_13327779.zip
filepath:第八部分/AAAAAAAA1/44/13327779.zip
filepath:《无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版》_13327779.zip — md5:ad1cac35c5e789f411774c1e3667fd97 — filesize:70720629
filepath:《无线网络安全--理论与应用=WIRELESS-NETWORK-SECURITY-THEORIES-AND-APPLICATIONS--英文版》_13327779.zip — md5:92d0eae971bffe7f3fdf80fc5fcb9ba5 — filesize:70614603
filepath:《无线网络安全--理论与应用=WIRELESS-NETWORK-SECURITY-THEORIES-AND-APPLICATIONS--英文版》_13327779.zip — md5:86783fe9db7cb93b28453d4ec1e27288 — filesize:70614603
filepath:《无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版》_13327779.zip — md5:273226166be7bd5fac706bec23aaab59 — filesize:70692108
filepath:无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版_13327779.zip — md5:e323e1d04b4a538623b838f687a0b604 — filesize:70821981
filepath:/读秀/读秀4.0/读秀/4.0/数据库18-3/《无线网络安全 理论与应用=WIRELESS NETWORK SECURITY THEORIES AND APPLICATIONS 英文版》_13327779.zip
filepath:13c/zjk-贵财0109/《无线网络安全--理论与应用=WIRELESS-NETWORK-SECURITY-THEORIES-AND-APPLICATIONS--英文版》_13327779.zip
filepath:无线网络安全 理论与应用_13327779.zip — md5:a4055fcc35735e5b9af406cce69bfb1f — filesize:70473471
filepath:无线网络安全 理论与应用_13327779.zip — md5:af0b126eb9e697de2a073581190a8657 — filesize:70473471
filepath:13327779.rar — md5:244f096dbca6586de99d281795cbc493 — filesize:70586588
filepath:13327779.zip — md5:c4c4cc932kb761da3744b8f098dc81f1 — filesize:70720629
filepath:843_28_2b/淮阴师范63/无线网络安全 理论与应用_13327779.zip
filepath:21a/淮阴师范63/无线网络安全 理论与应用_13327779.zip
filepath:第八部分/AAAAAAAA1/44/13327779.zip
开源日期
2024-06-13
❌ 此文件可能有问题,已从源库中隐藏。 有时这是应版权所有者的要求,有时是因为有更好的选择, 但有时是因为文件本身有问题。 下载可能仍然没问题,但我们建议先搜索替代文件。 更多细节:
- 并非所有页面都能转换为PDF ("49 affected pages")
- 并非所有页面都能转换为PDF ("49 affected pages")
如果您仍想下载此文件,请确保仅使用受信任的最新软件打开它。
🚀 快速下载
成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。
🐢 低速下载
由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)
- 低速服务器(合作方提供) #1 (稍快但需要排队)
- 低速服务器(合作方提供) #2 (稍快但需要排队)
- 低速服务器(合作方提供) #3 (稍快但需要排队)
- 低速服务器(合作方提供) #4 (稍快但需要排队)
- 低速服务器(合作方提供) #5 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #6 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #7 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #8 (无需排队,但可能非常慢)
- 低速服务器(合作方提供) #9 (无需排队,但可能非常慢)
- 下载后: 在我们的查看器中打开
外部下载
-
对于大文件,我们建议使用下载管理器以防止中断。
推荐的下载管理器:JDownloader -
您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
推荐的电子书阅读器:Anna的档案在线查看器、ReadEra和Calibre -
使用在线工具进行格式转换。
推荐的转换工具:CloudConvert和PrintFriendly -
您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
推荐的工具:亚马逊的“发送到 Kindle”和djazz 的“发送到 Kobo/Kindle” -
支持作者和图书馆
✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。
下面的文字仅以英文继续。
总下载量:
“文件的MD5”是根据文件内容计算出的哈希值,并且基于该内容具有相当的唯一性。我们这里索引的所有影子图书馆都主要使用MD5来标识文件。
一个文件可能会出现在多个影子图书馆中。有关我们编译的各种数据集的信息,请参见数据集页面。
有关此文件的详细信息,请查看其JSON 文件。 Live/debug JSON version. Live/debug page.