LEADER 03413nam 22005415 450 001 9910763595003321 005 20231114072742.0 010 $a3-031-41196-X 024 7 $a10.1007/978-3-031-41196-0 035 $a(CKB)28853138500041 035 $a(MiAaPQ)EBC30943290 035 $a(Au-PeEL)EBL30943290 035 $a(DE-He213)978-3-031-41196-0 035 $a(EXLCZ)9928853138500041 100 $a20231114d2023 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aEngineering Mathematics by Example$b[electronic resource] $eVol. II: Calculus /$fby Robert Sobot 205 $a2nd ed. 2023. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2023. 215 $a1 online resource (511 pages) 311 08$a9783031411953 327 $aBasic Number Theory -- Polynomials -- Linear Equations and Inequalities -- Exponential and Logarithmic Functions -- Trigonometry -- Complex Algebra -- Linear Algebra -- Limits -- Derivatives -- Function Analysis -- Integrals -- Multivariable Functions -- Complex Functions in Engineering and Science -- Differential Equations -- Special Functions -- Convolution Integral -- Series -- Discrete Convolution Sum -- Fourier Integral -- Discrete Fourier Integral. 330 $aThis textbook is a complete, self-sufficient, self-study/tutorial-type source of mathematical problems. It serves as a primary source for practicing and developing mathematical skills and techniques that will be essential in future studies and engineering practice. Rigor and mathematical formalism is drastically reduced, while the main focus is on developing practical skills and techniques for solving mathematical problems, given in forms typically found in engineering and science. These practical techniques are split into three separate books: the topics of algebra, complex algebra, and linear algebra (Vol. I), calculus of single and multiple argument functions (Vol. II), and continues and discrete Convolution and Fourier integrals/sums of typical functions used in signal processing, in addition to Laplace transform examples (Vol. III). Offers a large collection of progressively more sophisticated mathematical problems on main mathematical topics required for engineers/scientists; Provides, at the beginning of each topic, a brief review of definitions and formulas that are about to be used and practiced in the following problems; followed by the additional in-line reminders embedded at the key points of most solutions; Includes tutorial-style, complete solutions, to all problems. 606 $aElectronic circuits 606 $aSignal processing 606 $aEngineering mathematics 606 $aElectronic Circuits and Systems 606 $aSignal, Speech and Image Processing 606 $aEngineering Mathematics 615 0$aElectronic circuits. 615 0$aSignal processing. 615 0$aEngineering mathematics. 615 14$aElectronic Circuits and Systems. 615 24$aSignal, Speech and Image Processing . 615 24$aEngineering Mathematics. 676 $a621.3815 700 $aSobot$b Robert$0911795 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910763595003321 996 $aEngineering Mathematics by Example$92590853 997 $aUNINA LEADER 05305nam 22006614a 450 001 9911020189803321 005 20200520144314.0 010 $a9786610272488 010 $a9781280272486 010 $a1280272481 010 $a9780470299784 010 $a0470299789 010 $a9780470869680 010 $a0470869682 010 $a9780470869697 010 $a0470869690 035 $a(CKB)111087027098556 035 $a(EBL)219755 035 $a(OCoLC)53909501 035 $a(SSID)ssj0000243185 035 $a(PQKBManifestationID)11191190 035 $a(PQKBTitleCode)TC0000243185 035 $a(PQKBWorkID)10321180 035 $a(PQKB)11539847 035 $a(MiAaPQ)EBC219755 035 $a(Perlego)2774738 035 $a(EXLCZ)99111087027098556 100 $a20030724d2003 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecuring wireless LANs $ea practical guide for network managers, LAN administrators, and the home office user /$fGilbert Held 210 $aHoboken, NJ $cJ. Wiley$dc2003 215 $a1 online resource (274 p.) 300 $aDescription based upon print version of record. 311 08$a9780470851272 311 08$a0470851279 320 $aIncludes bibliographical references and index. 327 $asecuring wireless LANs; contents; Preface; Acknowledgements; Chapter 1 Introduction to Wireless LANs; 1.1 SECURING THE INSECURE; 1.1.1 AAE AND A FUNCTIONS; 1.1.2 AUTHENTICATION; 1.1.3 AUTHORIZATION; 1.1.4 ENCRYPTION; 1.1.5 ACCOUNTING; 1.1.6 PRACTICAL NETWORK PROTECTION METHODS; 1.2 NETWORK ARCHITECTURE; 1.2.1 BASIC NETWORKING DEVICES; 1.2.2 THE WIRELESS LAN STATION; 1.2.3 THE ACCESS POINT; 1.2.4 THE WIRELESS BRIDGE; 1.2.5 THE WIRELESS ROUTER; 1.2.6 THE BASIC SERVICE SET; 1.2.7 THE EXTENDED SERVICE SET (ESS); 1.2.8 STATION SERVICES; 1.3 IEEE WIRELESS LAN STANDARDS 327 $a1.3.1 THE BASIC IEEE 802.11 STANDARD1.3.2 802.11B; 1.3.3 802.11A; 1.3.4 802.11C; 1.3.5 802.11D; 1.3.6 802.11E; 1.3.7 802.11F; 1.3.8 802.11G; 1.3.9 802.11H; 1.3.10 802.11I; 1.4 BOOK PREVIEW; 1.4.1 FRAME FORMATS AND BASIC SECURITY OPERATIONS; 1.4.2 UNDERSTANDING WIRELESS SIGNALS; 1.4.3 UNDERSTANDING WEP; 1.4.4 SECURITY RISKS; 1.4.5 PROPRIETARY SECURITY ENHANCEMENT TECHNIQUES; 1.4.6 STANDARDS BASED SECURITY; Chapter 2 Frame Formats and Basic Security Operation; 2.1 FRAME FORMATS; 2.1.1 BASIC FRAME FORMAT; 2.1.2 FRAME CONTROL FIELD; 2.1.3 CONTROL FRAMES; 2.1.4 MANAGEMENT FRAMES 327 $a2.1.5 THE AUTHENTICATION PROCESS2.2 WEP AND PRIVACY; 2.2.1 MISCONCEPTIONS; 2.2.2 DEVELOPMENT CONSTRAINTS; 2.2.3 DEFICIENCIES; Chapter 3 Understanding Wireless Signals; 3.1 THE WIRELESS RF SPECTRUM AND BASIC MEASUREMENTS; 3.1.1 FREQUENCY; 3.1.2 PERIOD AND WAVELENGTH; 3.1.3 BANDWIDTH; 3.1.4 THE FREQUENCY SPECTRUM; 3.1.5 POWER MEASUREMENTS; 3.1.6 POWER LEVEL; 3.1.7 SIGNAL-TO-NOISE RATIO; 3.2 ANTENNA BASICS; 3.2.1 BASIC OPERATION; 3.2.2 CATEGORIES; 3.2.3 ANTENNA GAIN; 3.2.4 DIRECTIONALITY AND EIRP; 3.2.5 POWER LEVELS; 3.2.6 PROPAGATION LOSS; 3.2.7 INCREASING ANTENNA GAIN; 3.2.8 POWER LIMITS 327 $a3.2.9 RECEIVER SENSITIVITY3.2.10 REDUCING EMITTED RADIATION; 3.2.11 HORIZONTAL TRANSMISSION DISTANCE; 3.2.12 EQUIPMENT POSITIONING; 3.2.13 USING MONITORING EQUIPMENT; Chapter 4 Understanding WEP; 4.1 THE WEP FRAME BODY; 4.1.1 THE IV; 4.1.2 THE ICV; 4.1.3 THE NAKED DEFAULT; 4.1.4 WEP KEY LIMITATIONS; 4.2 LOCATING AND OBSERVING WIRELESS LAN TRAFFIC; 4.2.1 NETWORK STUMBLER; 4.2.2 MONITORING WITH AIROPEEK; 4.3 RC4; 4.3.1 OVERVIEW; 4.3.2 OPERATION; 4.3.3 ILLUSTRATIVE EXAMPLE; 4.3.4 STRENGTHS AND WEAKNESSES; 4.4 WEP WEAKNESS; 4.4.1 UNSAFE AT ANY SIZE; 4.4.2 THE INSECURITY OF 802.11 327 $a4.4.3 EXPLOITING RC4 WEAKNESS4.4.4 BREAKING WEP; 4.4.5 AIRSNORT; 4.4.6 WEPCRACK; Chapter 5 Security Risks and Countermeasures; 5.1 THE SSID; 5.1.1 OVERVIEW; 5.1.2 OVERRIDING THE SSID; 5.1.3 OBTAINING THE SSID; 5.1.4 COUNTERMEASURES; 5.2 EAVESDROPPING; 5.2.1 OVERVIEW; 5.2.2 THREATS; 5.2.3 COUNTERMEASURES; 5.3 MASQUERADE; 5.3.1 OVERVIEW; 5.3.2 COUNTERMEASURES; 5.4 DATA MODIFICATION; 5.4.1 OVERVIEW; 5.4.2 COUNTERMEASURES; 5.5 FILE SHARING; 5.5.1 OVERVIEW; 5.5.2 WINDOWS 95; 5.5.3 WINDOWS 2000; 5.5.4 COUNTERMEASURES; 5.6 JAMMING; 5.6.1 OVERVIEW; 5.6.2 COUNTERMEASURES; 5.7 ENCRYPTION ATTACKS 327 $a5.7.1 OVERVIEW 330 $aWireless LANs will enable small teams and communities to communicate via their mobile devices without cables. This new technology will facilitate communication in small businesses/teams such as in hospitals, on construction sites, warehouses, etc.Held provides a comprehensive guide to the implementation, planning and monitoring of all aspects of wireless LAN security in small offices/small to medium business (SMBs).Securing Wireless LANs is timely in addressing the security issues of this important new technology and equips its readers with the tools they need to make the appro 606 $aWireless LANs$xSecurity measures 615 0$aWireless LANs$xSecurity measures. 676 $a005.8 700 $aHeld$b Gilbert$f1943-$027769 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911020189803321 996 $aSecuring wireless LANs$94420816 997 $aUNINA