00762nam0-22002651i-450-99000447292040332119990530000447292FED01000447292(Aleph)000447292FED0100044729219990530d1886----km-y0itay50------baitay-------001yy<<I >>bimbi d'italiaStudi e voti intorno alla educazione popolare ed alla scuola infantile italianaPirro AportiRomaEuseo Molino1886270 p.18 cmAporti,Pirro169081ITUNINARICAUNIMARCBK9900044729204033215/ IV I 72s.i.FLFBCFLFBCBimbi d'Italia490748UNINA00970nam a2200277 i 4500991001807009707536020724s2002 enka 001 0 eng d0761970371076197038X (pbk.)b13430221-39ule_instSet. Economia - SAGAita657Marriott, Pru624133Introduction to accounting /Pru Marriott, J.R. Edwards and H.J. Mellett3. edLondon ;Thousand Oaks, Calif. :S,2002xlv, 537 p. :ill. ;25 cmContabilitàEdwards, John RichardMellett, Howard J..b1343022102-04-1401-08-06991001807009707536LE025 ECO 657 MAR01.0112025000203372le025-E39.88-l- 02120.i1427925301-08-06Introduction to accounting1097722UNISALENTOle02501-08-06ma -engenk0005188nam 2200541Ia 450 991101920930332120200520144314.01-282-69149-X97866126914920-470-61188-X0-470-61028-X(MiAaPQ)EBC477658(CKB)2550000000005870(EXLCZ)99255000000000587020090323d2009 uy 0engur|n|---|||||txtccrWireless and mobile networks security security basics, security in on-the-shelf and emerging technologies /edited by Hakima Chaouchi, Maryline Laurent-MaknaviciusLondon ISTE ;Hoboken, NJ John Wiley & Sons20091 online resource (689 p.)ISTE ;v.133Description based upon print version of record.Includes bibliographical references and index.Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.161.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction4.3.2. Wireless intrusion detection systems architecturesThis book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and moISTEWireless communication systemsSecurity measuresMobile communication systemsSecurity measuresWireless communication systemsSecurity measures.Mobile communication systemsSecurity measures.005.8Chaouchi Hakima1761031Laurent-Maknavicius Maryline1838776MiAaPQMiAaPQMiAaPQBOOK9911019209303321Wireless and mobile networks security4417845UNINA