04174nam 2200577 450 991078958190332120230120013548.01-4831-4633-2(CKB)3710000000027404(EBL)1828897(SSID)ssj0001063371(PQKBManifestationID)12452433(PQKBTitleCode)TC0001063371(PQKBWorkID)11024731(PQKB)11120891(MiAaPQ)EBC1828897(EXLCZ)99371000000002740420141120h19721972 uy 0engur|n|---|||||txtccrDrying principles and practice /R. B. KeeyFirst edition.Oxford, England :Pergamon Press,1972.©19721 online resource (391 p.)International Series of Monographs in Chemical Engineering ;Volume 13Description based upon print version of record.1-322-27286-7 0-08-016903-1 Includes bibliographical references at the end of each chapters and index.Front Cover; Drying Principles and Practice; Copyright Page; Table of Contents; Major Topics; Preface; Acknowledgment; Notation; Approximate Values of Some Common Properties; Chapter 1. Introduction; Drying Methods; Moisture Content and Humidity; Mass Balances over Dryers; Enthalpy; Energy Balances over Dryers; Direct-fired Dryers; Humidity and Enthalpy Charts; References; Chapter 2. Moisture-Solid Relationships; Vapour Pressure; Hygroscopicity; Moisture Isotherm; Equilibrium Data; Enthalpy of Bound Moisture; Capillary-porous Materials; Side Effects of Drying; ReferencesChapter 3. Transport Phenomena Potentials for Transfer; Transfer Fluxes; Transfer in a Porous Body; Conductivities; Transfer in a Mobile Medium; References; Chapter 4. Heat Transfer; Steady Conduction in Simple Bodies; Steady Conduction in Porous Bodies; Transient Conduction; Conduction Over Heated, Rotating Cylinders; Convection; Forced Convection to a Flat Plate; Convection to Bluff Bodies; Free Convection; Radiation; Gas radiation; Direct Electrical Heating; Microwave heating; References; Chapter 5. Migration of Moisture in Solids; Isothermal Diffusion; Isothermal EffusionIsothermal Capillary FlowMoisture Movement Near Dryness; Moisture Movement under Drying Conditions; Multicomponent Movement; References; Chapter 6. Evaporation and Humidification; Evaporation from a Plane Porous Body; Evaporation of Droplets; Humidification Processes; References; Chapter 7. Drying under Constant External Conditions; Drying of an Idealized Porous Body; Typical Drying Curves; Extrapolation and Interpolation of Data; Estimation of Drying Rates; References; Chapter 8. Batch Drying; Simple Batch Schedules; Complex Drying Schedules; Other Batch Processes; ReferencesChapter 9. Continuous Drying Drying in Mixed Systems; Single-stage Unmixed Dryers; Use of characteristic drying curve/adiabatic working; Multistaged Dryers; Intermittent Drying; References; Chapter 10. Less-common Drying Methods; Superheated steam; Solvent Drying; Freeze-drying; Pressure-cycling Methods; Other Methods; References; Chapter 11. Measurement and Control; Moisture-content Determination; Humidity Determination; Moisture-control Systems; References; Chapter 12. Engineering; Classification of Dryers; Selection of Dryers; Direct or indirect heating; Vacuum or atmospheric operationDrying equipmentSpecification sheets; Process Design; Other Design; Heating systems; Drying Costs; Conclusion; References; CONVERSION FACTORS FOR SOME COMMONUNITS INTO S.I. UNITS; APPENDIX; AUTHOR INDEX; SUBJECT INDEXDryingInternational series of monographs on chemical engineering ;Volume 13.DryingDrying.660.2/8426Keey R. B.1489630MiAaPQMiAaPQMiAaPQBOOK9910789581903321Drying3710406UNINA05305nam 22006614a 450 991102018980332120200520144314.0978661027248897812802724861280272481978047029978404702997899780470869680047086968297804708696970470869690(CKB)111087027098556(EBL)219755(OCoLC)53909501(SSID)ssj0000243185(PQKBManifestationID)11191190(PQKBTitleCode)TC0000243185(PQKBWorkID)10321180(PQKB)11539847(MiAaPQ)EBC219755(Perlego)2774738(EXLCZ)9911108702709855620030724d2003 uy 0engur|n|---|||||txtccrSecuring wireless LANs a practical guide for network managers, LAN administrators, and the home office user /Gilbert HeldHoboken, NJ J. Wileyc20031 online resource (274 p.)Description based upon print version of record.9780470851272 0470851279 Includes bibliographical references and index.securing wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.114.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS5.7.1 OVERVIEWWireless LANs will enable small teams and communities to communicate via their mobile devices without cables. This new technology will facilitate communication in small businesses/teams such as in hospitals, on construction sites, warehouses, etc.Held provides a comprehensive guide to the implementation, planning and monitoring of all aspects of wireless LAN security in small offices/small to medium business (SMBs).Securing Wireless LANs is timely in addressing the security issues of this important new technology and equips its readers with the tools they need to make the approWireless LANsSecurity measuresWireless LANsSecurity measures.005.8Held Gilbert1943-27769MiAaPQMiAaPQMiAaPQBOOK9911020189803321Securing wireless LANs4420816UNINA