LEADER 01439nam 2200373Ia 450 001 996395818903316 005 20200824125302.0 035 $a(CKB)4330000000317403 035 $a(EEBO)2248573758 035 $a(OCoLC)ocm12641935e 035 $a(OCoLC)12641935 035 $a(EXLCZ)994330000000317403 100 $a19851007d1688 uy | 101 0 $aeng 135 $aurbn||||a|bb| 200 14$aThe declaration of Francis Briber, Gent$b[electronic resource] $ewhich he publickly made before the Lord Bishop of Waterford, in the cathedral-church of Waterford, in the kingdom of Ireland, June the 17th, 1688 : containing the reasons for his renouncing the Roman-Catholic, and embracing the Protestant religion : together with what the Lord Bishop of Waterford return'd upon that occasion 210 $aLondon $cPrinted for Randal Taylor ...$d1688 215 $a4 p 300 $aCaption title. 300 $a"Imprimatur. Julii 26, 1688. H. Maurice" on p. 4. 300 $aImprint from colophon. 300 $aReproduction of original in Union Theological Seminary Library, New York. 330 $aeebo-0160 606 $aAnglican converts 615 0$aAnglican converts. 700 $aBriber$b Francis$01002479 801 0$bEAA 801 1$bEAA 801 2$bm/c 801 2$bWaOLN 906 $aBOOK 912 $a996395818903316 996 $aThe declaration of Francis Briber, Gent$92300889 997 $aUNISA LEADER 02840oam 2200493 450 001 9910437585903321 005 20190911112726.0 010 $a3-642-40646-7 024 7 $a10.1007/978-3-642-40646-1 035 $a(OCoLC)874932637 035 $a(MiFhGG)GVRL6XVO 035 $a(EXLCZ)993710000000024394 100 $a20130829d2013 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aBluetooth security attacks $ecomparative analysis, attacks, and countermeasures /$fKeijo Haataja [and three others] 205 $a1st ed. 2013. 210 1$aNew York :$cSpringer,$d2013. 215 $a1 online resource (vii, 93 pages) $cillustrations (some color) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 300 $a"ISSN: 2191-5768." 311 $a3-642-40645-9 320 $aIncludes bibliographical references. 327 $aChap. 1 - Introduction -- Chap. 2 - Overview of Bluetooth Security -- Chap. 3 - Bluetooth Network Vulnerabilities -- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks -- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth -- Chap. 6 - Countermeasures -- Chap. 7 - New Practical Attack -- Chap. 8 - Conclusion and Future Work References. 330 $aBluetooth technology has enjoyed tremendous success, and it's now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel attack that works against all existing Bluetooth versions. They conclude with a discussion on future research directions. The book is appropriate for practitioners and researchers in information security, in particular those engaged in the design of networked and mobile devices. 410 0$aSpringerBriefs in computer science. 606 $aBluetooth technology$xSecurity measures 606 $aComputer networks$xSecurity measures 615 0$aBluetooth technology$xSecurity measures. 615 0$aComputer networks$xSecurity measures. 676 $a005.8 700 $aHaataja$b Keijo$4aut$4http://id.loc.gov/vocabulary/relators/aut$01058044 702 $aHyppönen$b Konstantin$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aPasanen$b Sanna$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aToivanen$b Pekka$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910437585903321 996 $aBluetooth Security Attacks$92496651 997 $aUNINA