LEADER 00867nam0-22003251i-450- 001 990006308100403321 005 20040728142955.0 035 $a000630810 035 $aFED01000630810 035 $a(Aleph)000630810FED01 035 $a000630810 100 $a20000112d1960----km-y0itay50------ba 101 0 $aeng 102 $aGB 105 $aa-------001yy 200 1 $aMoney under review$fM. Manning Dacey 210 $aLondon$cHutchinson$d1960 215 $a175 p.$d22 cm 610 0 $aGran Bretagna$aFinanza 610 0 $aGran Bretagna$aPolitica monetaria 676 $a330 700 1$aDacey,$bWilliam Manning$0237788 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006308100403321 952 $aXV M 632$b63251$fFGBC 952 $aJ/0.2 DAC$b019006$fSES 959 $aSES 996 $aMoney under review$9641793 997 $aUNINA LEADER 02840oam 2200493 450 001 9910437585903321 005 20190911112726.0 010 $a3-642-40646-7 024 7 $a10.1007/978-3-642-40646-1 035 $a(OCoLC)874932637 035 $a(MiFhGG)GVRL6XVO 035 $a(EXLCZ)993710000000024394 100 $a20130829d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aBluetooth security attacks $ecomparative analysis, attacks, and countermeasures /$fKeijo Haataja [and three others] 205 $a1st ed. 2013. 210 1$aNew York :$cSpringer,$d2013. 215 $a1 online resource (vii, 93 pages) $cillustrations (some color) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $a"ISSN: 2191-5768." 311 $a3-642-40645-9 320 $aIncludes bibliographical references. 327 $aChap. 1 - Introduction -- Chap. 2 - Overview of Bluetooth Security -- Chap. 3 - Bluetooth Network Vulnerabilities -- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks -- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth -- Chap. 6 - Countermeasures -- Chap. 7 - New Practical Attack -- Chap. 8 - Conclusion and Future Work References. 330 $aBluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices. 410 0$aSpringerBriefs in computer science. 606 $aBluetooth technology$xSecurity measures 606 $aComputer networks$xSecurity measures 615 0$aBluetooth technology$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aHaataja$b Keijo$4aut$4http://id.loc.gov/vocabulary/relators/aut$01058044 702 $aHyppönen$b Konstantin$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aPasanen$b Sanna$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aToivanen$b Pekka$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910437585903321 996 $aBluetooth Security Attacks$92496651 997 $aUNINA