top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer assisted exercises and training : a reference guide / / Erdal #Cayirci, Dusan Marincic
Computer assisted exercises and training : a reference guide / / Erdal #Cayirci, Dusan Marincic
Autore #Cayirci E. (Erdal)
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , c2009
Descrizione fisica 1 online resource (313 p.)
Disciplina 355.5078/5
355.50785
Altri autori (Persone) MarinéciécDuésan
Soggetto topico Military education
Drill and minor tactics - Computer-assisted instruction
Military maneuvers - Computer-assisted instruction
Drill and minor tactics - Computer simulation
Military maneuvers - Computer simulation
Computer war games
ISBN 1-282-36885-0
9786612368851
0-470-49862-5
0-470-49861-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. I. Fundamentals and theory. Introduction -- Conflict and warfare -- Statistics and probability -- Simulation -- Distributed simulation -- Experimentation and analysis -- pt. II. Combat modeling, computer-assisted exercises, and practice. Computer-assisted exercise (CAX) architectures -- CAX PROCESS -- Combat modeling -- Computer-assisted exercise support tools -- Communications/information system issues, technical risks, and risk mitigation -- Exercise centers and facilities.
Record Nr. UNINA-9910139864503321
#Cayirci E. (Erdal)  
Hoboken, New Jersey : , : John Wiley & Sons, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer assisted exercises and training : a reference guide / / Erdal #Cayirci, Dusan Marincic
Computer assisted exercises and training : a reference guide / / Erdal #Cayirci, Dusan Marincic
Autore #Cayirci E. (Erdal)
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , c2009
Descrizione fisica 1 online resource (313 p.)
Disciplina 355.5078/5
355.50785
Altri autori (Persone) MarinéciécDuésan
Soggetto topico Military education
Drill and minor tactics - Computer-assisted instruction
Military maneuvers - Computer-assisted instruction
Drill and minor tactics - Computer simulation
Military maneuvers - Computer simulation
War video games
ISBN 1-282-36885-0
9786612368851
0-470-49862-5
0-470-49861-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto pt. I. Fundamentals and theory. Introduction -- Conflict and warfare -- Statistics and probability -- Simulation -- Distributed simulation -- Experimentation and analysis -- pt. II. Combat modeling, computer-assisted exercises, and practice. Computer-assisted exercise (CAX) architectures -- CAX PROCESS -- Combat modeling -- Computer-assisted exercise support tools -- Communications/information system issues, technical risks, and risk mitigation -- Exercise centers and facilities.
Record Nr. UNINA-9910830601903321
#Cayirci E. (Erdal)  
Hoboken, New Jersey : , : John Wiley & Sons, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong
Autore #Cayirci E. (Erdal)
Edizione [1st edition]
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , c2009
Descrizione fisica 1 online resource (283 p.)
Disciplina 005.8
621.384
Altri autori (Persone) RongChunming
Soggetto topico Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures
ISBN 1-282-68998-3
9786612689987
0-470-51678-X
0-470-51677-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index.
Record Nr. UNINA-9910145261303321
#Cayirci E. (Erdal)  
Chichester, U.K. : , : Wiley, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong
Security in wireless ad hoc and sensor networks / / Erdal #Caydrcd, Chunming Rong
Autore #Cayirci E. (Erdal)
Edizione [1st edition]
Pubbl/distr/stampa Chichester, U.K. : , : Wiley, , c2009
Descrizione fisica 1 online resource (283 p.)
Disciplina 005.8
621.384
Altri autori (Persone) RongChunming
Soggetto topico Ad hoc networks (Computer networks) - Security measures
Computer networks - Security measures
ISBN 1-282-68998-3
9786612689987
0-470-51678-X
0-470-51677-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto About the Authors -- Preface -- Acknowledgements -- List of Acronyms -- Part One Wireless Ad Hoc, Sensor and Mesh Networking -- 1 Introduction -- 1.1 Information Security -- 1.2 Scope of the Book -- 1.3 Structure of the Book -- 1.4 Electronic Resources for the Book -- 1.5 Review Questions -- 2 Wireless Ad Hoc, Sensor and Mesh Networks -- 2.1 Ad Hoc Networks and Applications -- 2.2 Sensor and Actuator Networks -- 2.3 Mesh Networks. / -- 2.4 Tactical Communications and Networks -- 2.5 Factors Influencing the Design of Wireless Ad Hoc, Sensor and Mesh Networks -- .6 Review Questions -- 3 The Wireless Medium -- 3.1 Wireless Channel Fundamentals and Security -- 3.2 Advanced Radio Technologies -- 3.3 Review Questions -- 4 Medium Access and Error Control -- 4.1 Medium Access Control -- 4.2 Error Control -- 4.3 Wireless Metropolitan Area Networks -- 4.4 Wireless Local Area Networks -- 4.5 Wireless Personal Area Networks. / -- 4.6 Review Questions -- 5 Routing -- 5.1 Internet Protocol and Mobile IP -- 5.2 Routing in Wireless Ad Hoc Networks -- 5.3 Routing in Wireless Sensor and Actuator Networks -- 5.4 Review Questions -- 6 Reliability, Flow and Congestion Control -- 6.1 Reliability -- 6.2 Flow and Congestion Control -- 6.3 Review Questions -- 7 Other Challenges and Security Aspects -- 7.1 Localization and Positioning -- 7.2 Time Synchronization -- 7.3 Addressing -- 7.4 Data Aggregation and Fusion -- 7.5 Data Querying -- 7.6 Coverage -- 7.7 Mobility Management -- 7.8 Cross-layer Design -- 7.9 Review Questions -- Part Two Security in Wireless Ad Hoc, Sensor and Mesh Networking -- 8 Security Attacks in Ad Hoc, Sensor and Mesh Networks -- 8.1 Security Attacks -- 8.2 Attackers -- 8.3 Security Goals -- 8.4 Review Questions -- 9 Cryptography -- 9.1 Symmetric Encryption -- 9.2 Asymmetric Encryption -- 9.3 Hash Functions and Message Authentication Code -- 9.4 Cascading Hashing -- 9.5 Review Questions -- 10 Challenges and Solutions: Basic Issues -- 10.1 Bootstrapping Security in Ad Hoc Networks.
10.2 Bootstrapping Security in Sensor Networks -- 10.3 Key Distribution, Exchange and Management -- 10.4 Authentication Issues -- 10.5 Integrity -- 10.6 Review Questions -- 11 Challenges and Solutions: Protection -- 11.1 Privacy and Anonymity -- 11.2 Intrusion Detection -- 11.3 Defense Against Traffic Analysis -- 11.4 Access Control and Secure Human / Computer Interaction -- 11.5 Software-Based Anti-Tamper Techniques -- 11.6 Tamper Resilience: Hardware Protection -- 11.7 Availability and Plausibility -- 11.8 Review Questions -- 12 Secure Routing -- 12.1 Defense Against Security Attacks in Ad Hoc Routing -- 12.2 Secure Ad Hoc Routing Protocols -- 12.3 Further Reading -- 12.4 Review Questions -- 13 Specific Challenges and Solutions -- 13.1 SPINS: Security Protocols for Sensor Networks -- 13.2 Quarantine Region Scheme for Spam Attacks -- 13.3 Secure Charging and Rewarding Scheme -- 13.4 Secure Node Localization -- 13.5 Secure Time Synchronization -- 13.6 Secure Event and Event Boundary Detection -- 13.7 Review Questions -- 14 Information Operations and Electronic Warfare -- 14.1 Electronic Support -- 14.2 Electronic Attack -- 14.3 Electronic Protection -- 14.4 Review Questions -- 15 Standards -- 15.1 X.800 and RFC 2828 -- 15.2 Wired Equivalent Privacy (WEP) -- 15.3 Wi-Fi Protected Access (WPA) -- References -- Index.
Record Nr. UNINA-9910830815703321
#Cayirci E. (Erdal)  
Chichester, U.K. : , : Wiley, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui