LEADER 01137nam0 22002771i 450 001 UON00481345 005 20231205105249.862 100 $a20170929d1899 |0itac50 ba 101 $ager 102 $aDE 105 $a|||| ||||| 200 1 $aNominale Stammbildungslehre der altgermanischen Dialecte$fvon Friedrich Kluge 205 $a2. aufl 210 $aHalle$cNiemeyer$d1899 215 $aX, 119 p.$d22 cm. 316 $aValore stimato$5IT-UONSI Fil.GIV/066 410 1$1001UON00175250$12001 $a Sammlung Kurzer Grammatiken germanischer Dialekte. B. : Ergänzungsreihe$1210 $aTübingen$cNiemeyer. 620 $dHalle$3UONL000424 700 1$aKLUGE$bFriedrich$3UONV163421$0165470 712 $aNiemeyer$3UONV248111$4650 801 $aIT$bSOL$c20241115$gRICA 899 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$2UONSI 912 $aUON00481345 950 $aSIBA - SISTEMA BIBLIOTECARIO DI ATENEO$dSI Fil.G IV 066 $eSI MR 37637 5 066 Valore stimato 996 $aNominale Stammbildungslehre der altgermanischen Dialecte$91740010 997 $aUNIOR LEADER 05188nam 2200541Ia 450 001 9911019209303321 005 20200520144314.0 010 $a1-282-69149-X 010 $a9786612691492 010 $a0-470-61188-X 010 $a0-470-61028-X 035 $a(MiAaPQ)EBC477658 035 $a(CKB)2550000000005870 035 $a(EXLCZ)992550000000005870 100 $a20090323d2009 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aWireless and mobile networks security $esecurity basics, security in on-the-shelf and emerging technologies /$fedited by Hakima Chaouchi, Maryline Laurent-Maknavicius 210 $aLondon $cISTE ;$aHoboken, NJ $cJohn Wiley & Sons$d2009 215 $a1 online resource (689 p.) 225 1 $aISTE ;$vv.133 300 $aDescription based upon print version of record. 320 $aIncludes bibliographical references and index. 327 $aWireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies; Table of Contents; Introduction; Part 1. Basic Concepts; Chapter 1. Introduction to Mobile and Wireless Networks; 1.1. Introduction; 1.2. Mobile cellular networks; 1.2.1. Introduction; 1.2.2. Cellular network basic concepts; 1.2.3. First generation (1G) mobile; 1.2.4. Second generation (2G) mobile; 1.2.5. Third generation (3G) mobile; 1.3. IEEE wireless networks; 1.3.1. Introduction; 1.3.2. WLAN: IEEE 802.11; 1.3.3. WPAN: IEEE 802.15; 1.3.4. WMAN: IEEE 802.16 327 $a1.3.5. WMAN mobile: IEEE 802.201.3.6. MIH: IEEE 802.21; 1.3.7. WRAN: IEEE 802.22; 1.4. Mobile Internet networks; 1.4.1. Introduction; 1.4.2. Macro mobility; 1.4.3. Micro mobility; 1.4.4. Personal mobility and SIP; 1.4.5. Identity based mobility; 1.4.6. NEMO and MANET networks; 1.5. Current trends; 1.5.1. All-IP, IMS and FMC; 1.5.2. B3G and 4G; 1.5.3. Applications; 1.6. Conclusions; 1.7. Bibliography; Chapter 2. Vulnerabilities of Wired and Wireless Networks; 2.1. Introduction; 2.2. Security in the digital age; 2.2.1. Private property: from vulnerabilities to risks 327 $a2.2.2. Definition of security2.2.3. Trust and subjectivity in security; 2.2.4. Services and security; 2.3. Threats and risks to telecommunications systems; 2.3.1. Role of telecommunications systems; 2.3.2. Threat models in telecommunications systems; 2.3.3. Homogenity vs. heterogenity; 2.3.4. The Internet and security; 2.3.5. The role of the medium; 2.3.6. Risks to the infrastructure; 2.3.7. Personal risks; 2.4. From wireline vulnerabilities to vulnerabilities in wireless communications; 2.4.1. Changing the medium; 2.4.2. Wireless terminals; 2.4.3. New services; 2.5. Conclusions 327 $a2.6. BibliographyChapter 3. Fundamental Security Mechanisms; 3.1. Introduction; 3.2. Basics on security; 3.2.1. Security services; 3.2.2. Symmetric and asymmetric cryptography; 3.2.3. Hash functions; 3.2.4. Electronic signatures and MAC; 3.2.5. Public Key Infrastructure (PKI) and electronic certificates; 3.2.6. Management of cryptographic keys; 3.2.7. Cryptographic protocols; 3.3. Secure communication protocols and VPN implementation; 3.3.1. Secure Socket Layer (SSL) and Transport Layer Security (TLS); 3.3.2. IPsec protocol suite; 3.3.3. Comparison between SSL and IPsec security protocols 327 $a3.3.4. IPsec VPN and SSL VPN3.4. Authentication; 3.4.1. Authentication mechanisms.; 3.4.2. AAA protocols to control access to a private network or an operator's network; 3.5. Access control; 3.5.1. Firewalls; 3.5.2. Intrusion detection; 3.6. Conclusions; 3.7. Bibliography; Chapter 4. Wi-Fi Security Dedicated Architectures; 4.1. Introduction; 4.2. Hot spot architecture: captive portals; 4.2.1. Overview; 4.2.2. Captive portal overview; 4.2.3. Security analysis; 4.2.4. Conclusions; 4.3. Wireless intrusion detection systems (WIDS); 4.3.1. Introduction 327 $a4.3.2. Wireless intrusion detection systems architectures 330 $aThis book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This material will be of invaluable use to all those working in the network security field, and especially to the many people entering the field. The next area of focus is on the security issues and available solutions associated with off-the-shelf wireless and mo 410 0$aISTE 606 $aWireless communication systems$xSecurity measures 606 $aMobile communication systems$xSecurity measures 615 0$aWireless communication systems$xSecurity measures. 615 0$aMobile communication systems$xSecurity measures. 676 $a005.8 701 $aChaouchi$b Hakima$01761031 701 $aLaurent-Maknavicius$b Maryline$01838776 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019209303321 996 $aWireless and mobile networks security$94417845 997 $aUNINA