LEADER 05379nam 2200757Ia 450 001 9910457082903321 005 20200520144314.0 010 $a1-281-00975-X 010 $a9786611009755 010 $a0-08-047631-7 035 $a(CKB)1000000000349965 035 $a(EBL)234971 035 $a(OCoLC)824885364 035 $a(SSID)ssj0000115913 035 $a(PQKBManifestationID)11141454 035 $a(PQKBTitleCode)TC0000115913 035 $a(PQKBWorkID)10026804 035 $a(PQKB)10153805 035 $a(MiAaPQ)EBC234971 035 $a(CaSebORM)9780750677462 035 $a(PPN)185634737 035 $a(Au-PeEL)EBL234971 035 $a(CaPaEBR)ebr10127920 035 $a(CaONFJC)MIL100975 035 $a(EXLCZ)991000000000349965 100 $a20050816d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBulletproof wireless security$b[electronic resource] $eGSM, UMTS, 802.11 and ad hoc security /$fby Praphul Chandra 205 $a1st edition 210 $aAmsterdam ;$aOxford $cNewnes$d2005 215 $a1 online resource (272 p.) 225 1 $aCommunications engineering series 300 $aDescription based upon print version of record. 311 $a0-7506-7746-5 320 $aIncludes bibliographical references (p. 229-230) and index. 327 $a1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC 327 $a2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS 327 $a3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11 327 $a5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP 327 $a6.3.2 Code Security 330 $aFinally--a single volume guide to really effective security for both voice and data wireless networks!More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly ""bulletproof"" wireless security is now more than a desirable feature--instead, it's a necessity to protect essential personal and business data from hackers and eavesdroppers.In this handy reference, Praphul Chandra gives you the conceptual and practical tools every RF, wireless, and network engineer needs for high-security wireless ap 410 0$aCommunications engineering series. 606 $aWireless communication systems$xSecurity measures 606 $aWireless LANs$xSecurity measures 606 $aGlobal system for mobile communications$xSecurity measures 606 $aUniversal Mobile Telecommunications System$xSecurity measures 606 $aIEEE 802.11 (Standard) 608 $aElectronic books. 615 0$aWireless communication systems$xSecurity measures. 615 0$aWireless LANs$xSecurity measures. 615 0$aGlobal system for mobile communications$xSecurity measures. 615 0$aUniversal Mobile Telecommunications System$xSecurity measures. 615 0$aIEEE 802.11 (Standard) 676 $a005.8 700 $aChandra$b Praphul$0877369 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910457082903321 996 $aBulletproof wireless security$91959178 997 $aUNINA