LEADER 02017nam 2200589Ia 450 001 9910791821503321 005 20230721012844.0 010 $a1-61209-732-4 035 $a(CKB)2560000000069961 035 $a(EBL)3018991 035 $a(SSID)ssj0000418170 035 $a(PQKBManifestationID)11313447 035 $a(PQKBTitleCode)TC0000418170 035 $a(PQKBWorkID)10370884 035 $a(PQKB)11416403 035 $a(MiAaPQ)EBC3018991 035 $a(Au-PeEL)EBL3018991 035 $a(CaPaEBR)ebr10662797 035 $a(OCoLC)923659770 035 $a(EXLCZ)992560000000069961 100 $a20080319d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aFrom problem toward solution$b[electronic resource] $ewireless sensor networks security /$fZhen Jiang and Yi Pan, editors 210 $aNew York $cNova Science Publishers$dc2009 215 $a1 online resource (398 p.) 225 1 $aDistributed, cluster and grid computing 300 $aDescription based upon print version of record. 311 $a1-60456-457-1 320 $aIncludes bibliographical references and index. 410 0$aDistributed, cluster, and grid computing. 606 $aSensor networks$xSecurity measures 606 $aWireless LANs$xSecurity measures 606 $aWireless metropolitan area networks$xSecurity measures 606 $aAd hoc networks (Computer networks)$xSecurity measures 615 0$aSensor networks$xSecurity measures. 615 0$aWireless LANs$xSecurity measures. 615 0$aWireless metropolitan area networks$xSecurity measures. 615 0$aAd hoc networks (Computer networks)$xSecurity measures. 676 $a681/.25 701 $aJiang$b Zhen$01478432 701 $aPan$b Yi$f1960-$0895857 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910791821503321 996 $aFrom problem toward solution$93694110 997 $aUNINA