802.11bb-2023 - IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks--Specific Requirements Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Light Communications / / IEEE
| 802.11bb-2023 - IEEE Standard for Information Technology--Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks--Specific Requirements Part 11 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 6: Light Communications / / IEEE |
| Pubbl/distr/stampa | New York, USA : , : IEEE, , 2023 |
| Descrizione fisica | 1 online resource (37 pages) |
| Disciplina | 005.8 |
| Soggetto topico |
Wireless LANs - Security measures
Wireless metropolitan area networks |
| ISBN | 979-88-557-0008-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996559960403316 |
| New York, USA : , : IEEE, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Best practices for wireless fidelity (802.11b) network vulnerabilities [[electronic resource]]
| Best practices for wireless fidelity (802.11b) network vulnerabilities [[electronic resource]] |
| Pubbl/distr/stampa | [Washington, D.C.] : , : National Infrastructure Protection Center, , [2002?] |
| Soggetto topico | Wireless LANs - Security measures |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Best practices for wireless fidelity |
| Record Nr. | UNINA-9910691612903321 |
| [Washington, D.C.] : , : National Infrastructure Protection Center, , [2002?] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Bluetooth and wireless local area networks : security guides / / Rene I. Jenkins, editor
| Bluetooth and wireless local area networks : security guides / / Rene I. Jenkins, editor |
| Pubbl/distr/stampa | New York, [New York] : , : Novinka, , 2013 |
| Descrizione fisica | 1 online resource (90 pages) : illustrations (some color) |
| Disciplina | 005.8 |
| Collana | Media and Communications - Technologies, Policies and Challenges |
| Soggetto topico |
Bluetooth technology - Security measures
Wireless LANs - Security measures |
| ISBN | 1-62417-260-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910155072203321 |
| New York, [New York] : , : Novinka, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
| Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra |
| Autore | Chandra Praphul |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam ; ; Oxford, : Newnes, 2005 |
| Descrizione fisica | 1 online resource (272 p.) |
| Disciplina | 005.8 |
| Collana | Communications engineering series |
| Soggetto topico |
Wireless communication systems - Security measures
Wireless LANs - Security measures Global system for mobile communications - Security measures Universal Mobile Telecommunications System - Security measures IEEE 802.11 (Standard) |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-281-00975-X
9786611009755 0-08-047631-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC
2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS 3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11 5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP 6.3.2 Code Security |
| Record Nr. | UNINA-9910457082903321 |
Chandra Praphul
|
||
| Amsterdam ; ; Oxford, : Newnes, 2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra
| Bulletproof wireless security [[electronic resource] ] : GSM, UMTS, 802.11 and ad hoc security / / by Praphul Chandra |
| Autore | Chandra Praphul |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Amsterdam ; ; Oxford, : Newnes, 2005 |
| Descrizione fisica | 1 online resource (272 p.) |
| Disciplina | 005.8 |
| Collana | Communications engineering series |
| Soggetto topico |
Wireless communication systems - Security measures
Wireless LANs - Security measures Global system for mobile communications - Security measures Universal Mobile Telecommunications System - Security measures IEEE 802.11 (Standard) |
| ISBN |
1-281-00975-X
9786611009755 0-08-047631-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
1.7 Beyond Cryptography1.7.1 Firewalls; 1.7.2 Denial of Service Attacks; 1.7.3 Code Security; 1.7.4 Steganography; 1.8 Conclusion; Chapter 2: Network Security Protocols; 2.1 Introduction; 2.2 Key Establishment Protocols; 2.2.1 Key Generation in SKC; 2.2.2 Key Distribution in SKC; 2.2.3 Key Establishment in PKC; 2.2.4 Diffie-Hellman Key Exchange; 2.2.5 Enhanced Diffie-Hellman Key Exchange; 2.2.6 RSA; 2.3 Authentication Protocols; 2.3.1 Address-Based Authentication; 2.3.2 Passwords for Local Authentication (Login); 2.3.3 Passwords for Network Authentication; 2.3.4 Authentication Using SKC
2.3.5 Authentication Using PKC2.3.6 What to Use for Authentication: SKC or PKC?; 2.3.7 Session Hijacking; 2.3.8 Needham Schroeder; 2.3.9 Kerberos; 2.4 Encryption Protocols; 2.4.1 DES; 2.4.2 TripleDES or 3DES; 2.4.3 AES; 2.4.4 RC4; 2.5 Integrity Protocols; 2.5.1 CBC Residue; 2.5.2 CRC32; 2.5.3 MD5; Chapter 3: Security and the Layered Architecture; 3.1 Introduction; 3.2 Security at Layer 1; 3.3 Security at Layer 2; 3.3.1 Extensible Authentication Protocol (EAP); 3.3.2 EAPoL: EAP Over LAN; 3.3.3 EAP-TLS: TLS Handshake Over EAP; 3.4 Security at Layer 3; 3.5 Security at Layer 4: SSL/TLS 3.6 Security at Layer 5+Chapter 4: Voice-Oriented Wireless Networks; 4.1 The Wireless Medium; 4.1.1 Radio Propagation Effects; 4.1.2 Hidden Terminal Problem; 4.1.3 Exposed Terminal Problem; 4.1.4 Bandwidth; 4.1.5 Other Constraints; 4.2 The Cellular Architecture; 4.3 TWNs: First Generation; 4.3.1 Addresses in AMPS; 4.3.2 Call Setup in AMPS; 4.4 TWNs: Second Generation; 4.4.1 Addresses in GSM; 4.4.2 Call Setup in GSM; 4.5 TWNs: Third Generation; 4.5.1 Connection Setup in UMTS; 4.6 The Overall Picture; Chapter 5: Data-Oriented Wireless Networks; 5.1 WLANs; 5.1.1: Addresses in 802.11 5.1.2 Connection Setup in 802.115.1.3 Media Access; 5.1.4 Spectrum Efficiency in 802.11; 5.2 MANETs; 5.2.1 MAC for MANETs; 5.2.2 Routing in MANETs.; 5.2.3 Address Allocation in MANETs; 5.2.4 Security in MANETs; 5.3 Wireless Networks in the Near Future; Chapter 6: Security in Traditional Wireless Networks; 6.1 Security in First Generation TWNs; 6.2 Security in Second Generation TWNs; 6.2.1 Anonymity in GSM; 6.2.2 Key Establishment in GSM; 6.2.3 Authentication in GSM; 6.2.4 Confidentiality in GSM; 6.2.5 What's Wrong with GSM Security?; 6.3 Security in 2.5 Generation TWNs; 6.3.1 WAP 6.3.2 Code Security |
| Record Nr. | UNINA-9910784359303321 |
Chandra Praphul
|
||
| Amsterdam ; ; Oxford, : Newnes, 2005 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
| From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors |
| Pubbl/distr/stampa | New York, : Nova Science Publishers, c2009 |
| Descrizione fisica | 1 online resource (398 p.) |
| Disciplina | 681/.25 |
| Altri autori (Persone) |
JiangZhen
PanYi <1960-> |
| Collana | Distributed, cluster and grid computing |
| Soggetto topico |
Sensor networks - Security measures
Wireless LANs - Security measures Wireless metropolitan area networks - Security measures Ad hoc networks (Computer networks) - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN | 1-61209-732-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910465694603321 |
| New York, : Nova Science Publishers, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors
| From problem toward solution [[electronic resource] ] : wireless sensor networks security / / Zhen Jiang and Yi Pan, editors |
| Pubbl/distr/stampa | New York, : Nova Science Publishers, c2009 |
| Descrizione fisica | 1 online resource (398 p.) |
| Disciplina | 681/.25 |
| Altri autori (Persone) |
JiangZhen
PanYi <1960-> |
| Collana | Distributed, cluster and grid computing |
| Soggetto topico |
Sensor networks - Security measures
Wireless LANs - Security measures Wireless metropolitan area networks - Security measures Ad hoc networks (Computer networks) - Security measures |
| ISBN | 1-61209-732-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910791821503321 |
| New York, : Nova Science Publishers, c2009 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Hack proofing your wireless network [electronic resource] / Christian Barnes ... [et al.] ; Neal O'Farrell, technical editor
| Hack proofing your wireless network [electronic resource] / Christian Barnes ... [et al.] ; Neal O'Farrell, technical editor |
| Pubbl/distr/stampa | Rockland, Mass. : Syngress Pub. : Distributed by Publishers Group West in the U.S. & Jaguar Book Group in Canada, c2002 |
| Descrizione fisica | xxviii, 483 p. : ill. ; 24 cm. |
| Disciplina | 005.8 |
| Altri autori (Persone) |
Barnes, Christian.author
O'Farrell, Neal |
| Soggetto topico |
Computer networks - Security measures
Wireless communication systems - Security measures Wireless LANs - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781928994596
1928994598 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003253929707536 |
| Rockland, Mass. : Syngress Pub. : Distributed by Publishers Group West in the U.S. & Jaguar Book Group in Canada, c2002 | ||
| Lo trovi qui: Univ. del Salento | ||
| ||
Hacking wireless access points : cracking, tracking, and signal jacking / / Jennifer Ann Kurtz, Information Assurance Affiliate Faculty at Regis University ; Richard Kaczmarek, technical editor
| Hacking wireless access points : cracking, tracking, and signal jacking / / Jennifer Ann Kurtz, Information Assurance Affiliate Faculty at Regis University ; Richard Kaczmarek, technical editor |
| Autore | Kurtz Jennifer Ann |
| Edizione | [1st edition] |
| Pubbl/distr/stampa | Cambridge, MA : , : Syngress, , [2017] |
| Descrizione fisica | 1 online resource (xv, 155 pages) : illustrations (some color) |
| Disciplina | 004.1675068 |
| Collana | Gale eBooks |
| Soggetto topico |
Wireless LANs - Security measures
Hacking Computer security |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | chapter 1. Wireless technology overview -- chapter 2. Wireless adoption -- chapter 3. Blurred edges : fixed and mobile wireless access points -- chapter 4. Hacks against individuals -- chapter 5. WAPs in commercial and industrial contexts -- chapter 6. WAPs in medical environments -- chapter 7. Hacking wireless access points : governmental context -- chapter 8. Noncivilian government context -- chapter 9. Summary and call to action. |
| Record Nr. | UNINA-9910583387903321 |
Kurtz Jennifer Ann
|
||
| Cambridge, MA : , : Syngress, , [2017] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
How to cheat at securing a wireless network [electronic resource] / Chris Hurley, Lee Barken
| How to cheat at securing a wireless network [electronic resource] / Chris Hurley, Lee Barken |
| Autore | Hurley, Chris. |
| Pubbl/distr/stampa | Rockland, Mass. : Syngress |
| Descrizione fisica | xxv, 453 p. : ill. ; 23 cm. |
| Disciplina | 005.8 |
| Altri autori (Persone) | Barken, Lee.author |
| Soggetto topico | Wireless LANs - Security measures |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9781597490870
1597490873 |
| Formato | Risorse elettroniche |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISALENTO-991003251379707536 |
Hurley, Chris.
|
||
| Rockland, Mass. : Syngress | ||
| Lo trovi qui: Univ. del Salento | ||
| ||