Computer assisted exercises and training : a reference guide / / Erdal #Cayirci, Dusan Marincic |
Autore | #Cayirci E. (Erdal) |
Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, , c2009 |
Descrizione fisica | 1 online resource (313 p.) |
Disciplina |
355.5078/5
355.50785 |
Altri autori (Persone) | MarinéciécDuésan |
Soggetto topico |
Military education
Drill and minor tactics - Computer-assisted instruction Military maneuvers - Computer-assisted instruction Drill and minor tactics - Computer simulation Military maneuvers - Computer simulation Computer war games |
ISBN |
1-282-36885-0
9786612368851 0-470-49862-5 0-470-49861-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. I. Fundamentals and theory. Introduction -- Conflict and warfare -- Statistics and probability -- Simulation -- Distributed simulation -- Experimentation and analysis -- pt. II. Combat modeling, computer-assisted exercises, and practice. Computer-assisted exercise (CAX) architectures -- CAX PROCESS -- Combat modeling -- Computer-assisted exercise support tools -- Communications/information system issues, technical risks, and risk mitigation -- Exercise centers and facilities. |
Record Nr. | UNINA-9910139864503321 |
#Cayirci E. (Erdal) | ||
Hoboken, New Jersey : , : John Wiley & Sons, , c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer assisted exercises and training : a reference guide / / Erdal #Cayirci, Dusan Marincic |
Autore | #Cayirci E. (Erdal) |
Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, , c2009 |
Descrizione fisica | 1 online resource (313 p.) |
Disciplina |
355.5078/5
355.50785 |
Altri autori (Persone) | MarinéciécDuésan |
Soggetto topico |
Military education
Drill and minor tactics - Computer-assisted instruction Military maneuvers - Computer-assisted instruction Drill and minor tactics - Computer simulation Military maneuvers - Computer simulation War video games |
ISBN |
1-282-36885-0
9786612368851 0-470-49862-5 0-470-49861-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | pt. I. Fundamentals and theory. Introduction -- Conflict and warfare -- Statistics and probability -- Simulation -- Distributed simulation -- Experimentation and analysis -- pt. II. Combat modeling, computer-assisted exercises, and practice. Computer-assisted exercise (CAX) architectures -- CAX PROCESS -- Combat modeling -- Computer-assisted exercise support tools -- Communications/information system issues, technical risks, and risk mitigation -- Exercise centers and facilities. |
Record Nr. | UNINA-9910830601903321 |
#Cayirci E. (Erdal) | ||
Hoboken, New Jersey : , : John Wiley & Sons, , c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong |
Autore | #Cayirci E. (Erdal) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester, U.K. : , : Wiley, , c2009 |
Descrizione fisica | 1 online resource (283 p.) |
Disciplina |
005.8
621.384 |
Altri autori (Persone) | RongChunming |
Soggetto topico |
Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures |
ISBN |
1-282-68998-3
9786612689987 0-470-51678-X 0-470-51677-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index. |
Record Nr. | UNINA-9910145261303321 |
#Cayirci E. (Erdal) | ||
Chichester, U.K. : , : Wiley, , c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong |
Autore | #Cayirci E. (Erdal) |
Edizione | [1st edition] |
Pubbl/distr/stampa | Chichester, U.K. : , : Wiley, , c2009 |
Descrizione fisica | 1 online resource (283 p.) |
Disciplina |
005.8
621.384 |
Altri autori (Persone) | RongChunming |
Soggetto topico |
Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures |
ISBN |
1-282-68998-3
9786612689987 0-470-51678-X 0-470-51677-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index. |
Record Nr. | UNINA-9910830815703321 |
#Cayirci E. (Erdal) | ||
Chichester, U.K. : , : Wiley, , c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|